Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2,589)
  • Open Access

    ARTICLE

    Cross-Domain Bilateral Access Control on Blockchain-Cloud Based Data Trading System

    Youngho Park1, Su Jin Shin2, Sang Uk Shin3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 671-688, 2024, DOI:10.32604/cmes.2024.052378 - 20 August 2024

    Abstract Data trading enables data owners and data requesters to sell and purchase data. With the emergence of blockchain technology, research on blockchain-based data trading systems is receiving a lot of attention. Particularly, to reduce the on-chain storage cost, a novel paradigm of blockchain and cloud fusion has been widely considered as a promising data trading platform. Moreover, the fact that data can be used for commercial purposes will encourage users and organizations from various fields to participate in the data marketplace. In the data marketplace, it is a challenge how to trade the data securely… More >

  • Open Access

    ARTICLE

    A Novel Framework to Construct S-Box Quantum Circuits Using System Modeling: Application to 4-Bit S-Boxes

    Yongjin Jeon, Seungjun Baek#, Jongsung Kim*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 545-561, 2024, DOI:10.32604/cmes.2024.052374 - 20 August 2024

    Abstract Quantum computers accelerate many algorithms based on the superposition principle of quantum mechanics. The Grover algorithm provides significant performance to malicious users attacking symmetric key systems. Since the performance of attacks using quantum computers depends on the efficiency of the quantum circuit of the encryption algorithms, research research on the implementation of quantum circuits is essential. This paper presents a new framework to construct quantum circuits of substitution boxes (S-boxes) using system modeling. We model the quantum circuits of S-boxes using two layers: Toffoli and linear layers. We generate vector spaces based on the values… More >

  • Open Access

    ARTICLE

    AI-Based Helmet Violation Detection for Traffic Management System

    Yahia Said1,*, Yahya Alassaf2, Refka Ghodhbani3, Yazan Ahmad Alsariera4, Taoufik Saidani3, Olfa Ben Rhaiem4, Mohamad Khaled Makhdoum1, Manel Hleili5

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 733-749, 2024, DOI:10.32604/cmes.2024.052369 - 20 August 2024

    Abstract Enhancing road safety globally is imperative, especially given the significant portion of traffic-related fatalities attributed to motorcycle accidents resulting from non-compliance with helmet regulations. Acknowledging the critical role of helmets in rider protection, this paper presents an innovative approach to helmet violation detection using deep learning methodologies. The primary innovation involves the adaptation of the PerspectiveNet architecture, transitioning from the original Res2Net to the more efficient EfficientNet v2 backbone, aimed at bolstering detection capabilities. Through rigorous optimization techniques and extensive experimentation utilizing the India driving dataset (IDD) for training and validation, the system demonstrates exceptional More >

  • Open Access

    REVIEW

    Unlocking the Potential: A Comprehensive Systematic Review of ChatGPT in Natural Language Processing Tasks

    Ebtesam Ahmad Alomari*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 43-85, 2024, DOI:10.32604/cmes.2024.052256 - 20 August 2024

    Abstract As Natural Language Processing (NLP) continues to advance, driven by the emergence of sophisticated large language models such as ChatGPT, there has been a notable growth in research activity. This rapid uptake reflects increasing interest in the field and induces critical inquiries into ChatGPT’s applicability in the NLP domain. This review paper systematically investigates the role of ChatGPT in diverse NLP tasks, including information extraction, Name Entity Recognition (NER), event extraction, relation extraction, Part of Speech (PoS) tagging, text classification, sentiment analysis, emotion recognition and text annotation. The novelty of this work lies in its… More >

  • Open Access

    ARTICLE

    A Fault Detection Method for Electric Vehicle Battery System Based on Bayesian Optimization SVDD Considering a Few Faulty Samples

    Miao Li, Fanyong Cheng*, Jiong Yang, Maxwell Mensah Duodu, Hao Tu

    Energy Engineering, Vol.121, No.9, pp. 2543-2568, 2024, DOI:10.32604/ee.2024.051231 - 19 August 2024

    Abstract Accurate and reliable fault detection is essential for the safe operation of electric vehicles. Support vector data description (SVDD) has been widely used in the field of fault detection. However, constructing the hypersphere boundary only describes the distribution of unlabeled samples, while the distribution of faulty samples cannot be effectively described and easily misses detecting faulty data due to the imbalance of sample distribution. Meanwhile, selecting parameters is critical to the detection performance, and empirical parameterization is generally time-consuming and laborious and may not result in finding the optimal parameters. Therefore, this paper proposes a… More >

  • Open Access

    ARTICLE

    Risk-Balanced Routing Strategy for Service Function Chains of Cyber-Physical Power System Considering Cross-Space Cascading Failure

    He Wang, Xingyu Tong, Huanan Yu*, Xiao Hu, Jing Bian

    Energy Engineering, Vol.121, No.9, pp. 2525-2542, 2024, DOI:10.32604/ee.2024.050594 - 19 August 2024

    Abstract Cyber-physical power system (CPPS) has significantly improved the operational efficiency of power systems. However, cross-space cascading failures may occur due to the coupling characteristics, which poses a great threat to the safety and reliability of CPPS, and there is an acute need to reduce the probability of these failures. Towards this end, this paper first proposes a cascading failure index to identify and quantify the importance of different information in the same class of communication services. On this basis, a joint improved risk-balanced service function chain routing strategy (SFC-RS) is proposed, which is modeled as More >

  • Open Access

    ARTICLE

    Regenerative Braking Energy Recovery System of Metro Train Based on Dual-Mode Power Management

    Feng Zhao, Xiaotong Zhu*, Xiaoqiang Chen, Ying Wang

    Energy Engineering, Vol.121, No.9, pp. 2585-2601, 2024, DOI:10.32604/ee.2024.049762 - 19 August 2024

    Abstract In order to fully utilize the regenerative braking energy of metro trains and stabilize the metro DC traction busbar voltage, a hybrid regenerative braking energy recovery system with a dual-mode power management strategy is proposed. Firstly, the construction of the hybrid regenerative braking energy recovery system is explained. Then, based on the power demand of low-voltage load in metro stations, a dual-mode power management strategy is proposed to allocate the reference power of each system according to the different working conditions, and the control methods of each system are set. Finally, the correctness and effectiveness More > Graphic Abstract

    Regenerative Braking Energy Recovery System of Metro Train Based on Dual-Mode Power Management

  • Open Access

    ARTICLE

    A Pre-Selection-Based Ant Colony System for Integrated Resources Scheduling Problem at Marine Container Terminal

    Rong Wang1, Xinxin Xu2, Zijia Wang3,*, Fei Ji1, Nankun Mu4

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2363-2385, 2024, DOI:10.32604/cmc.2024.053564 - 15 August 2024

    Abstract Marine container terminal (MCT) plays a key role in the marine intelligent transportation system and international logistics system. However, the efficiency of resource scheduling significantly influences the operation performance of MCT. To solve the practical resource scheduling problem (RSP) in MCT efficiently, this paper has contributions to both the problem model and the algorithm design. Firstly, in the problem model, different from most of the existing studies that only consider scheduling part of the resources in MCT, we propose a unified mathematical model for formulating an integrated RSP. The new integrated RSP model allocates and… More >

  • Open Access

    REVIEW

    Deep Transfer Learning Techniques in Intrusion Detection System-Internet of Vehicles: A State-of-the-Art Review

    Wufei Wu1, Javad Hassannataj Joloudari2,3,4, Senthil Kumar Jagatheesaperumal5, Kandala N. V. P. S. Rajesh6, Silvia Gaftandzhieva7,*, Sadiq Hussain8, Rahimullah Rabih9, Najibullah Haqjoo10, Mobeen Nazar11, Hamed Vahdat-Nejad9, Rositsa Doneva12

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2785-2813, 2024, DOI:10.32604/cmc.2024.053037 - 15 August 2024

    Abstract The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles (IoV) technology. The functional advantages of IoV include online communication services, accident prevention, cost reduction, and enhanced traffic regularity. Despite these benefits, IoV technology is susceptible to cyber-attacks, which can exploit vulnerabilities in the vehicle network, leading to perturbations, disturbances, non-recognition of traffic signs, accidents, and vehicle immobilization. This paper reviews the state-of-the-art achievements and developments in applying Deep Transfer Learning (DTL) models for Intrusion Detection Systems in the Internet of Vehicles (IDS-IoV) based on anomaly… More >

  • Open Access

    REVIEW

    Security and Privacy Challenges in SDN-Enabled IoT Systems: Causes, Proposed Solutions, and Future Directions

    Ahmad Rahdari1,6, Ahmad Jalili2, Mehdi Esnaashari3, Mehdi Gheisari1,4,7,8,*, Alisa A. Vorobeva5, Zhaoxi Fang1, Panjun Sun1,*, Viktoriia M. Korzhuk5, Ilya Popov5, Zongda Wu1, Hamid Tahaei1

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2511-2533, 2024, DOI:10.32604/cmc.2024.052994 - 15 August 2024

    Abstract Software-Defined Networking (SDN) represents a significant paradigm shift in network architecture, separating network logic from the underlying forwarding devices to enhance flexibility and centralize deployment. Concurrently, the Internet of Things (IoT) connects numerous devices to the Internet, enabling autonomous interactions with minimal human intervention. However, implementing and managing an SDN-IoT system is inherently complex, particularly for those with limited resources, as the dynamic and distributed nature of IoT infrastructures creates security and privacy challenges during SDN integration. The findings of this study underscore the primary security and privacy challenges across application, control, and data planes.… More >

Displaying 41-50 on page 5 of 2589. Per Page