Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (161)
  • Open Access

    REVIEW

    Deep Transfer Learning Techniques in Intrusion Detection System-Internet of Vehicles: A State-of-the-Art Review

    Wufei Wu1, Javad Hassannataj Joloudari2,3,4, Senthil Kumar Jagatheesaperumal5, Kandala N. V. P. S. Rajesh6, Silvia Gaftandzhieva7,*, Sadiq Hussain8, Rahimullah Rabih9, Najibullah Haqjoo10, Mobeen Nazar11, Hamed Vahdat-Nejad9, Rositsa Doneva12

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2785-2813, 2024, DOI:10.32604/cmc.2024.053037 - 15 August 2024

    Abstract The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles (IoV) technology. The functional advantages of IoV include online communication services, accident prevention, cost reduction, and enhanced traffic regularity. Despite these benefits, IoV technology is susceptible to cyber-attacks, which can exploit vulnerabilities in the vehicle network, leading to perturbations, disturbances, non-recognition of traffic signs, accidents, and vehicle immobilization. This paper reviews the state-of-the-art achievements and developments in applying Deep Transfer Learning (DTL) models for Intrusion Detection Systems in the Internet of Vehicles (IDS-IoV) based on anomaly… More >

  • Open Access

    ARTICLE

    FADSF: A Data Sharing Model for Intelligent Connected Vehicles Based on Blockchain Technology

    Yan Sun, Caiyun Liu, Jun Li, Yitong Liu*

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2351-2362, 2024, DOI:10.32604/cmc.2024.048903 - 15 August 2024

    Abstract With the development of technology, the connected vehicle has been upgraded from a traditional transport vehicle to an information terminal and energy storage terminal. The data of ICV (intelligent connected vehicles) is the key to organically maximizing their efficiency. However, in the context of increasingly strict global data security supervision and compliance, numerous problems, including complex types of connected vehicle data, poor data collaboration between the IT (information technology) domain and OT (operation technology) domain, different data format standards, lack of shared trust sources, difficulty in ensuring the quality of shared data, lack of data… More >

  • Open Access

    ARTICLE

    Research on Robustness of Charging Station Networks under Multiple Recommended Charging Methods for Electric Vehicles

    Lei Feng1, Miao Liu1, Yexun Yuan1, Chi Zhang2, Peng Geng1,*

    Journal on Internet of Things, Vol.6, pp. 1-16, 2024, DOI:10.32604/jiot.2024.053584 - 24 July 2024

    Abstract With the rapid development of electric vehicles, the requirements for charging stations are getting higher and higher. In this study, we constructed a charging station topology network in Nanjing through the Space-L method, mapping charging stations as network nodes and constructing edges through road relationships. The experiment introduced five EV charging recommendation strategies (based on distance, number of fast charging piles, user preference, price, and overall rating) used to simulate disordered charging caused by different user preferences, and the impact of the network dynamic robustness in case of node failure is explored by simulating the… More >

  • Open Access

    ARTICLE

    A Blockchain-Based Efficient Cross-Domain Authentication Scheme for Internet of Vehicles

    Feng Zhao1, Hongtao Ding2, Chunhai Li1,*, Zhaoyu Su2, Guoling Liang2, Changsong Yang3

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 567-585, 2024, DOI:10.32604/cmc.2024.052233 - 18 July 2024

    Abstract The Internet of Vehicles (IoV) is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network. However, due to the open and variable nature of its network topology, vehicles frequently engage in cross-domain interactions. During such processes, directly uploading sensitive information to roadside units for interaction may expose it to malicious tampering or interception by attackers, thus compromising the security of the cross-domain authentication process. Additionally, IoV imposes high real-time requirements, and existing cross-domain authentication schemes for IoV often encounter efficiency issues. To mitigate More >

  • Open Access

    ARTICLE

    Lithium-Ion Battery Pack Based on Fuzzy Logic Control Research on Multi-Layer Equilibrium Circuits

    Tiezhou Wu, Yukan Zhang*

    Energy Engineering, Vol.121, No.8, pp. 2231-2255, 2024, DOI:10.32604/ee.2024.049883 - 19 July 2024

    Abstract In order to solve the problem of inconsistent energy in the charging and discharging cycles of lithium-ion battery packs, a new multilayer equilibrium topology is designed in this paper. The structure adopts a hierarchical structure design, which includes intra-group equilibrium, primary inter-group equilibrium and secondary inter-group equilibrium. This structure greatly increases the number of equilibrium paths for lithium-ion batteries, thus shortening the time required for equilibrium, and improving the overall efficiency. In terms of control strategy, fuzzy logic control (FLC) is chosen to control the size of the equilibrium current during the equilibrium process. We… More >

  • Open Access

    ARTICLE

    Drive Train Cooling Options for Electric Vehicles

    Randeep Singh1,*, Tomoki Oridate2, Tien Nguyen2

    Frontiers in Heat and Mass Transfer, Vol.22, No.3, pp. 703-717, 2024, DOI:10.32604/fhmt.2024.050744 - 11 July 2024

    Abstract Electrification of vehicles intensifies their cooling demands due to the requirements of maintaining electronics/electrical systems below their maximum temperature threshold. In this paper, passive cooling approaches based on heat pipes have been considered for the thermal management of electric vehicle (EV) traction systems including battery, inverter, and motor. For the battery, a heat pipe base plate is used to provide high heat removal (180 W per module) and better thermal uniformity (<5°C) for the battery modules in a pack while downsizing the liquid cold plate system. In the case of Inverter, two phase cooling system… More > Graphic Abstract

    Drive Train Cooling Options for Electric Vehicles

  • Open Access

    ARTICLE

    Unmanned Aerial Vehicles General Aerial Person-Vehicle Recognition Based on Improved YOLOv8s Algorithm

    Zhijian Liu*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3787-3803, 2024, DOI:10.32604/cmc.2024.048998 - 26 March 2024

    Abstract Considering the variations in imaging sizes of the unmanned aerial vehicles (UAV) at different aerial photography heights, as well as the influence of factors such as light and weather, which can result in missed detection and false detection of the model, this paper presents a comprehensive detection model based on the improved lightweight You Only Look Once version 8s (YOLOv8s) algorithm used in natural light and infrared scenes (L_YOLO). The algorithm proposes a special feature pyramid network (SFPN) structure and substitutes most of the neck feature extraction module with the Special deformable convolution feature extraction… More >

  • Open Access

    REVIEW

    A Systematic Literature Review of Machine Learning and Deep Learning Approaches for Spectral Image Classification in Agricultural Applications Using Aerial Photography

    Usman Khan1, Muhammad Khalid Khan1, Muhammad Ayub Latif1, Muhammad Naveed1,2,*, Muhammad Mansoor Alam2,3,4, Salman A. Khan1, Mazliham Mohd Su’ud2,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 2967-3000, 2024, DOI:10.32604/cmc.2024.045101 - 26 March 2024

    Abstract Recently, there has been a notable surge of interest in scientific research regarding spectral images. The potential of these images to revolutionize the digital photography industry, like aerial photography through Unmanned Aerial Vehicles (UAVs), has captured considerable attention. One encouraging aspect is their combination with machine learning and deep learning algorithms, which have demonstrated remarkable outcomes in image classification. As a result of this powerful amalgamation, the adoption of spectral images has experienced exponential growth across various domains, with agriculture being one of the prominent beneficiaries. This paper presents an extensive survey encompassing multispectral and… More >

  • Open Access

    ARTICLE

    Road Traffic Monitoring from Aerial Images Using Template Matching and Invariant Features

    Asifa Mehmood Qureshi1, Naif Al Mudawi2, Mohammed Alonazi3, Samia Allaoua Chelloug4, Jeongmin Park5,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3683-3701, 2024, DOI:10.32604/cmc.2024.043611 - 26 March 2024

    Abstract Road traffic monitoring is an imperative topic widely discussed among researchers. Systems used to monitor traffic frequently rely on cameras mounted on bridges or roadsides. However, aerial images provide the flexibility to use mobile platforms to detect the location and motion of the vehicle over a larger area. To this end, different models have shown the ability to recognize and track vehicles. However, these methods are not mature enough to produce accurate results in complex road scenes. Therefore, this paper presents an algorithm that combines state-of-the-art techniques for identifying and tracking vehicles in conjunction with… More >

  • Open Access

    ARTICLE

    A Novel Intrusion Detection Model of Unknown Attacks Using Convolutional Neural Networks

    Abdullah Alsaleh1,2,*

    Computer Systems Science and Engineering, Vol.48, No.2, pp. 431-449, 2024, DOI:10.32604/csse.2023.043107 - 19 March 2024

    Abstract With the increasing number of connected devices in the Internet of Things (IoT) era, the number of intrusions is also increasing. An intrusion detection system (IDS) is a secondary intelligent system for monitoring, detecting and alerting against malicious activity. IDS is important in developing advanced security models. This study reviews the importance of various techniques, tools, and methods used in IoT detection and/or prevention systems. Specifically, it focuses on machine learning (ML) and deep learning (DL) techniques for IDS. This paper proposes an accurate intrusion detection model to detect traditional and new attacks on the… More >

Displaying 11-20 on page 2 of 161. Per Page