Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,233)
  • Open Access

    ARTICLE

    An Asset-Based Approach to Mitigate Zero-Day Ransomware Attacks

    Farag Azzedin*, Husam Suwad, Md Mahfuzur Rahman

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3003-3020, 2022, DOI:10.32604/cmc.2022.028646

    Abstract This article presents an asset-based security system where security practitioners build their systems based on information they own and not solicited by observing attackers’ behavior. Current security solutions rely on information coming from attackers. Examples are current monitoring and detection security solutions such as intrusion prevention/detection systems and firewalls. This article envisions creating an imbalance between attackers and defenders in favor of defenders. As such, we are proposing to flip the security game such that it will be led by defenders and not attackers. We are proposing a security system that does not observe the behavior of the attack. On… More >

  • Open Access

    ARTICLE

    SAFT-VNDN: A Socially-Aware Forwarding Technique in Vehicular Named Data Networking

    Amel Boudelaa1, Zohra Abdelhafidi1, Nasreddine Lagraa1, Chaker Abdelaziz Kerrache1, Muhammad Bilal2, Daehan Kwak3,*, Mohamed Bachir Yagoubi1

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2495-2512, 2022, DOI:10.32604/cmc.2022.028619

    Abstract Vehicular Social Networks (VSNs) is the bridge of social networks and Vehicular Ad-Hoc Networks (VANETs). VSNs are promising as they allow the exchange of various types of contents in large-scale through Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication protocols. Vehicular Named Data Networking (VNDN) is an auspicious communication paradigm for the challenging VSN environment since it can optimize content dissemination by decoupling contents from their physical locations. However, content dissemination and caching represent crucial challenges in VSNs due to short link lifetime and intermittent connectivity caused by vehicles’ high mobility. Our aim with this paper is to improve content delivery and… More >

  • Open Access

    ARTICLE

    A Scalable Double-Chain Storage Module for Blockchain

    Hui Han1,2, Wunan Wan1,2,*, Jinquan Zhang1,2, Zhi Qin1,2, Xiaofang Qiu1,2, Shibin Zhang1,2, Jinyue Xia3

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2651-2662, 2022, DOI:10.32604/cmc.2022.028607

    Abstract With the growing maturity of blockchain technology, its peer-to-peer model and fully duplicated data storage pattern enable blockchain to act as a distributed ledger in untrustworthy environments. Blockchain storage has also become a research hotspot in industry, finance, and academia due to its security, and its unique data storage management model is gradually becoming a key technology to play its value in various fields’ applications. However, with the increasing amount of data written into the blockchain, the blockchain system faces many problems in its actual implementation of the application, such as high storage space occupation, low data flexibility and availability,… More >

  • Open Access

    ARTICLE

    Deep Learning Enabled Object Detection and Tracking Model for Big Data Environment

    K. Vijaya Kumar1, E. Laxmi Lydia2, Ashit Kumar Dutta3, Velmurugan Subbiah Parvathy4, Gobi Ramasamy5, Irina V. Pustokhina6,*, Denis A. Pustokhin7

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2541-2554, 2022, DOI:10.32604/cmc.2022.028570

    Abstract Recently, big data becomes evitable due to massive increase in the generation of data in real time application. Presently, object detection and tracking applications becomes popular among research communities and finds useful in different applications namely vehicle navigation, augmented reality, surveillance, etc. This paper introduces an effective deep learning based object tracker using Automated Image Annotation with Inception v2 based Faster RCNN (AIA-IFRCNN) model in big data environment. The AIA-IFRCNN model annotates the images by Discriminative Correlation Filter (DCF) with Channel and Spatial Reliability tracker (CSR), named DCF-CSRT model. The AIA-IFRCNN technique employs Faster RCNN for object detection and tracking,… More >

  • Open Access

    ARTICLE

    Optimal IoT Based Improved Deep Learning Model for Medical Image Classification

    Prasanalakshmi Balaji1,*, B. Sri Revathi2, Praveetha Gobinathan3, Shermin Shamsudheen3, Thavavel Vaiyapuri4

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2275-2291, 2022, DOI:10.32604/cmc.2022.028560

    Abstract Recently medical image classification plays a vital role in medical image retrieval and computer-aided diagnosis system. Despite deep learning has proved to be superior to previous approaches that depend on handcrafted features; it remains difficult to implement because of the high intra-class variance and inter-class similarity generated by the wide range of imaging modalities and clinical diseases. The Internet of Things (IoT) in healthcare systems is quickly becoming a viable alternative for delivering high-quality medical treatment in today’s e-healthcare systems. In recent years, the Internet of Things (IoT) has been identified as one of the most interesting research subjects in… More >

  • Open Access

    ARTICLE

    Development of Mobile App to Support the Mobility of Visually Impaired People

    R. Meenakshi1, R. Ponnusamy1,*, Saleh Alghamdi2, Osama Ibrahim Khalaf3, Youseef Alotaibi4

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3473-3495, 2022, DOI:10.32604/cmc.2022.028540

    Abstract In 2017, it was estimated that the number of persons of all ages visually affected would be two hundred and eighty-five million, of which thirty-nine million are blind. There are several innovative technical solutions available to facilitate the movement of these people. The next big challenge for technical people is to give cost-effective solutions. One of the challenges for people with visual impairments is navigating safely, recognizing obstacles, and moving freely between locations in unfamiliar environments. A new mobile application solution is developed, and the application can be installed in android mobile. The application will visualize the environment with portable… More >

  • Open Access

    ARTICLE

    ESSD: Energy Saving and Securing Data Algorithm for WSNs Security

    Manar M. Aldaseen1, Khaled M. Matrouk1, Laiali H. Almazaydeh2,*, Khaled M. Elleithy3

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3969-3981, 2022, DOI:10.32604/cmc.2022.028520

    Abstract The Wireless Sensor Networks (WSNs) are characterized by their widespread deployment due to low cost, but the WSNs are vulnerable to various types of attacks. To defend against the attacks, an effective security solution is required. However, the limits of these networks’ battery-based energy to the sensor are the most critical impediments to selecting cryptographic techniques. Consequently, finding a suitable algorithm that achieves the least energy consumption in data encryption and decryption and providing a highly protected system for data remains the fundamental problem. In this research, the main objective is to obtain data security during transmission by proposing a… More >

  • Open Access

    ARTICLE

    Data Reliability and Sensors Lifetime in Bridge Health Monitoring using LoRaWAN-Zigbee

    Awad Ali1,*, Reyazur Rashid Irshad1, Ahmed Abdu Alattaab1, Aamir Fatahayab2

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2663-2678, 2022, DOI:10.32604/cmc.2022.028503

    Abstract The Wireless Sensor Network (WSN) is regarded as the fastest expanding technological trend in recent years due its application in a variety of sectors. In the monitoring region, several sensor nodes with various sensing capabilities are installed to gather appropriate data and communicate it to the gateway. The proposed system of the heterogeneous WSN employing LoRaWAN-Zigbee based hybrid communication is explored in this research study. To communicate in a network, two Long–Range Wide Area Network (LoRaWAN) sensor clusters and two Zigbee sensor clusters are employed, together with two Zigbee and LoRaWAN converters. The suggested Golden eagle shepherd optimization (GESO) method… More >

  • Open Access

    ARTICLE

    Design and Implementation of a State-feedback Controller Using LQR Technique

    Aamir Shahzad1,*, Shadi Munshi2, Sufyan Azam2, Muhammad Nasir Khan3

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2897-2911, 2022, DOI:10.32604/cmc.2022.028441

    Abstract The main objective of this research is to design a state-feedback controller for the rotary inverted pendulum module utilizing the linear quadratic regulator (LQR) technique. The controller maintains the pendulum in the inverted (upright) position and is robust enough to reject external disturbance to maintain its stability. The research work involves three major contributions: mathematical modeling, simulation, and real-time implementation. To design a controller, mathematical modeling has been done by employing the Newton-Euler, Lagrange method. The resulting model was nonlinear so linearization was required, which has been done around a working point. For the estimation of the controller parameters, MATLAB… More >

  • Open Access

    ARTICLE

    Root-Of-Trust for Continuous Integration and Continuous Deployment Pipeline in Cloud Computing

    Abdul Saboor1,*, Mohd Fadzil Hassan2, Rehan Akbar1, Erwin Susanto3, Syed Nasir Mehmood Shah4, Muhammad Aadil Siddiqui5, Saeed Ahmed Magsi5

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2223-2239, 2022, DOI:10.32604/cmc.2022.028382

    Abstract Cloud computing has gained significant use over the last decade due to its several benefits, including cost savings associated with setup, deployments, delivery, physical resource sharing across virtual machines, and availability of on-demand cloud services. However, in addition to usual threats in almost every computing environment, cloud computing has also introduced a set of new threats as consumers share physical resources due to the physical co-location paradigm. Furthermore, since there are a growing number of attacks directed at cloud environments (including dictionary attacks, replay code attacks, denial of service attacks, rootkit attacks, code injection attacks, etc.), customers require additional assurances… More >

Displaying 7511-7520 on page 752 of 22233. Per Page