Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (466)
  • Open Access

    ARTICLE

    Energy Blockchain in Smart Communities: Towards Affordable Clean Energy Supply for the Built Environment

    Mingguan Zhao1,4, Lida Liao2,*, Penglong Liang1, Meng Li1, Xinsheng Dong1, Yang Yang1, Hongxia Wang1, Zhenhao Zhang3

    Energy Engineering, Vol.121, No.8, pp. 2313-2330, 2024, DOI:10.32604/ee.2024.048261

    Abstract The rapid growth of distributed renewable energy penetration is promoting the evolution of the energy system toward decentralization and decentralized and digitized smart grids. This study was based on energy blockchain, and developed a dual-biding mechanism based on the real-time energy surplus and demand in the local smart grid, which is expected to enable reliable, affordable, and clean energy supply in smart communities. In the proposed system, economic benefits could be achieved by replacing fossil-fuel-based electricity with the high penetration of affordable solar PV electricity. The reduction of energy surplus realized by distributed energy production More >

  • Open Access

    ARTICLE

    Intrusion Detection System for Smart Industrial Environments with Ensemble Feature Selection and Deep Convolutional Neural Networks

    Asad Raza1,*, Shahzad Memon1, Muhammad Ali Nizamani1, Mahmood Hussain Shah2

    Intelligent Automation & Soft Computing, Vol.39, No.3, pp. 545-566, 2024, DOI:10.32604/iasc.2024.051779

    Abstract Smart Industrial environments use the Industrial Internet of Things (IIoT) for their routine operations and transform their industrial operations with intelligent and driven approaches. However, IIoT devices are vulnerable to cyber threats and exploits due to their connectivity with the internet. Traditional signature-based IDS are effective in detecting known attacks, but they are unable to detect unknown emerging attacks. Therefore, there is the need for an IDS which can learn from data and detect new threats. Ensemble Machine Learning (ML) and individual Deep Learning (DL) based IDS have been developed, and these individual models achieved… More >

  • Open Access

    ARTICLE

    LSTM Based Neural Network Model for Anomaly Event Detection in Care-Independent Smart Homes

    Brij B. Gupta1,2,3,*, Akshat Gaurav4, Razaz Waheeb Attar5, Varsha Arya6,7, Ahmed Alhomoud8, Kwok Tai Chui9

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2689-2706, 2024, DOI:10.32604/cmes.2024.050825

    Abstract This study introduces a long-short-term memory (LSTM)-based neural network model developed for detecting anomaly events in care-independent smart homes, focusing on the critical application of elderly fall detection. It balances the dataset using the Synthetic Minority Over-sampling Technique (SMOTE), effectively neutralizing bias to address the challenge of unbalanced datasets prevalent in time-series classification tasks. The proposed LSTM model is trained on the enriched dataset, capturing the temporal dependencies essential for anomaly recognition. The model demonstrated a significant improvement in anomaly detection, with an accuracy of 84%. The results, detailed in the comprehensive classification and confusion More >

  • Open Access

    ARTICLE

    Security Analysis in Smart Agriculture: Insights from a Cyber-Physical System Application

    Ahmed Redha Mahlous*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4781-4803, 2024, DOI:10.32604/cmc.2024.050821

    Abstract Smart agriculture modifies traditional farming practices, and offers innovative approaches to boost production and sustainability by leveraging contemporary technologies. In today’s world where technology is everything, these technologies are utilized to streamline regular tasks and procedures in agriculture, one of the largest and most significant industries in every nation. This research paper stands out from existing literature on smart agriculture security by providing a comprehensive analysis and examination of security issues within smart agriculture systems. Divided into three main sections—security analysis, system architecture and design and risk assessment of Cyber-Physical Systems (CPS) applications—the study delves… More >

  • Open Access

    ARTICLE

    AnonymousTollPass: A Blockchain-Based Privacy-Preserving Electronic Toll Payment Model

    Jane Kim1, Soojin Lee1, Chan Yeob Yeun2, Seung-Hyun Seo1,3,*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3495-3518, 2024, DOI:10.32604/cmc.2024.050461

    Abstract As big data, Artificial Intelligence, and Vehicle-to-Everything (V2X) communication have advanced, Intelligent Transportation Systems (ITS) are being developed to enable efficient and safe transportation systems. Electronic Toll Collection (ETC), which is one of the services included in ITS systems, is an automated system that allows vehicles to pass through toll plazas without stopping for manual payment. The ETC system is widely deployed on highways due to its contribution to stabilizing the overall traffic system flow. To ensure secure and efficient toll payments, designing a distributed model for sharing toll payment information among untrusted toll service… More >

  • Open Access

    ARTICLE

    Smart Micro Grid Energy System Management Based on Optimum Running Cost for Rural Communities in Rwanda

    Fabien Mukundufite1,*, Jean Marie Vianney Bikorimana1, Alexander Kyaruzi Lugatona2

    Energy Engineering, Vol.121, No.7, pp. 1805-1821, 2024, DOI:10.32604/ee.2024.051398

    Abstract The governmental electric utility and the private sector are joining hands to meet the target of electrifying all households by 2024. However, the aforementioned goal is challenged by households that are scattered in remote areas. So far, Solar Home Systems (SHS) have mostly been applied to increase electricity access in rural areas. SHSs have continuous constraints to meet electricity demands and cannot run income-generating activities. The current research presents the feasibility study of electrifying Remera village with the smart microgrid as a case study. The renewable energy resources available in Remera are the key sources… More >

  • Open Access

    REVIEW

    Market Operation of Energy Storage System in Smart Grid: A Review

    Li Deng1, Jiafei Huan1, Wei Wang1, Weitao Zhang1, Liangbin Xie2, Lun Dong2, Jingrong Guo2, Zhongping Li2, Yuan Huang2,*, Yue Xiang2

    Energy Engineering, Vol.121, No.6, pp. 1403-1437, 2024, DOI:10.32604/ee.2024.046393

    Abstract As a flexible resource, energy storage plays an increasingly significant role in stabilizing and supporting the power system, while providing auxiliary services. Still, the current high demand for energy storage contrasts with the fuzzy lack of market-oriented mechanisms for energy storage, the principle of market-oriented operation has not been embodied, and there is no unified and systematic analytical framework for the business model. However, the dispatch management model of energy storage in actual power system operation is not clear. Still, the specific scheduling process and energy storage strategy on the source-load-network side could be more… More >

  • Open Access

    ARTICLE

    Ensemble Deep Learning Based Air Pollution Prediction for Sustainable Smart Cities

    Maha Farouk Sabir1, Mahmoud Ragab2,3,*, Adil O. Khadidos2, Khaled H. Alyoubi1, Alaa O. Khadidos1,4

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 627-643, 2024, DOI:10.32604/csse.2023.041551

    Abstract Big data and information and communication technologies can be important to the effectiveness of smart cities. Based on the maximal attention on smart city sustainability, developing data-driven smart cities is newly obtained attention as a vital technology for addressing sustainability problems. Real-time monitoring of pollution allows local authorities to analyze the present traffic condition of cities and make decisions. Relating to air pollution occurs a main environmental problem in smart city environments. The effect of the deep learning (DL) approach quickly increased and penetrated almost every domain, comprising air pollution forecast. Therefore, this article develops… More >

  • Open Access

    ARTICLE

    A Hybrid Manufacturing Process Monitoring Method Using Stacked Gated Recurrent Unit and Random Forest

    Chao-Lung Yang1,*, Atinkut Atinafu Yilma1,2, Bereket Haile Woldegiorgis2, Hendrik Tampubolon3,4, Hendri Sutrisno5

    Intelligent Automation & Soft Computing, Vol.39, No.2, pp. 233-254, 2024, DOI:10.32604/iasc.2024.043091

    Abstract This study proposed a new real-time manufacturing process monitoring method to monitor and detect process shifts in manufacturing operations. Since real-time production process monitoring is critical in today’s smart manufacturing. The more robust the monitoring model, the more reliable a process is to be under control. In the past, many researchers have developed real-time monitoring methods to detect process shifts early. However, these methods have limitations in detecting process shifts as quickly as possible and handling various data volumes and varieties. In this paper, a robust monitoring model combining Gated Recurrent Unit (GRU) and Random… More >

  • Open Access

    ARTICLE

    Preserving Data Secrecy and Integrity for Cloud Storage Using Smart Contracts and Cryptographic Primitives

    Maher Alharby*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2449-2463, 2024, DOI:10.32604/cmc.2024.050425

    Abstract Cloud computing has emerged as a viable alternative to traditional computing infrastructures, offering various benefits. However, the adoption of cloud storage poses significant risks to data secrecy and integrity. This article presents an effective mechanism to preserve the secrecy and integrity of data stored on the public cloud by leveraging blockchain technology, smart contracts, and cryptographic primitives. The proposed approach utilizes a Solidity-based smart contract as an auditor for maintaining and verifying the integrity of outsourced data. To preserve data secrecy, symmetric encryption systems are employed to encrypt user data before outsourcing it. An extensive More >

Displaying 1-10 on page 1 of 466. Per Page