Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (485)
  • Open Access

    ARTICLE

    Improving Smart Home Security via MQTT: Maximizing Data Privacy and Device Authentication Using Elliptic Curve Cryptography

    Zainatul Yushaniza Mohamed Yusoff1, Mohamad Khairi Ishak2,*, Lukman A. B. Rahim3, Mohd Shahrimie Mohd Asaari1

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1669-1697, 2024, DOI:10.32604/csse.2024.056741 - 22 November 2024

    Abstract The rapid adoption of Internet of Things (IoT) technologies has introduced significant security challenges across the physical, network, and application layers, particularly with the widespread use of the Message Queue Telemetry Transport (MQTT) protocol, which, while efficient in bandwidth consumption, lacks inherent security features, making it vulnerable to various cyber threats. This research addresses these challenges by presenting a secure, lightweight communication proxy that enhances the scalability and security of MQTT-based Internet of Things (IoT) networks. The proposed solution builds upon the Dang-Scheme, a mutual authentication protocol designed explicitly for resource-constrained environments and enhances it… More >

  • Open Access

    REVIEW

    A Systematic Review of Automated Classification for Simple and Complex Query SQL on NoSQL Database

    Nurhadi, Rabiah Abdul Kadir*, Ely Salwana Mat Surin, Mahidur R. Sarker*

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1405-1435, 2024, DOI:10.32604/csse.2024.051851 - 22 November 2024

    Abstract A data lake (DL), abbreviated as DL, denotes a vast reservoir or repository of data. It accumulates substantial volumes of data and employs advanced analytics to correlate data from diverse origins containing various forms of semi-structured, structured, and unstructured information. These systems use a flat architecture and run different types of data analytics. NoSQL databases are nontabular and store data in a different manner than the relational table. NoSQL databases come in various forms, including key-value pairs, documents, wide columns, and graphs, each based on its data model. They offer simpler scalability and generally outperform… More >

  • Open Access

    ARTICLE

    Improved IChOA-Based Reinforcement Learning for Secrecy Rate Optimization in Smart Grid Communications

    Mehrdad Shoeibi1, Mohammad Mehdi Sharifi Nevisi2, Sarvenaz Sadat Khatami3, Diego Martín2,*, Sepehr Soltani4, Sina Aghakhani5

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2819-2843, 2024, DOI:10.32604/cmc.2024.056823 - 18 November 2024

    Abstract In the evolving landscape of the smart grid (SG), the integration of non-organic multiple access (NOMA) technology has emerged as a pivotal strategy for enhancing spectral efficiency and energy management. However, the open nature of wireless channels in SG raises significant concerns regarding the confidentiality of critical control messages, especially when broadcasted from a neighborhood gateway (NG) to smart meters (SMs). This paper introduces a novel approach based on reinforcement learning (RL) to fortify the performance of secrecy. Motivated by the need for efficient and effective training of the fully connected layers in the RL… More >

  • Open Access

    ARTICLE

    Augmenting Internet of Medical Things Security: Deep Ensemble Integration and Methodological Fusion

    Hamad Naeem1, Amjad Alsirhani2,*, Faeiz M. Alserhani3, Farhan Ullah4, Ondrej Krejcar1

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.3, pp. 2185-2223, 2024, DOI:10.32604/cmes.2024.056308 - 31 October 2024

    Abstract When it comes to smart healthcare business systems, network-based intrusion detection systems are crucial for protecting the system and its networks from malicious network assaults. To protect IoMT devices and networks in healthcare and medical settings, our proposed model serves as a powerful tool for monitoring IoMT networks. This study presents a robust methodology for intrusion detection in Internet of Medical Things (IoMT) environments, integrating data augmentation, feature selection, and ensemble learning to effectively handle IoMT data complexity. Following rigorous preprocessing, including feature extraction, correlation removal, and Recursive Feature Elimination (RFE), selected features are standardized… More >

  • Open Access

    ARTICLE

    A Genetic Algorithm-Based Optimized Transfer Learning Approach for Breast Cancer Diagnosis

    Hussain AlSalman1, Taha Alfakih2, Mabrook Al-Rakhami2, Mohammad Mehedi Hassan2,*, Amerah Alabrah2

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.3, pp. 2575-2608, 2024, DOI:10.32604/cmes.2024.055011 - 31 October 2024

    Abstract Breast cancer diagnosis through mammography is a pivotal application within medical image-based diagnostics, integral for early detection and effective treatment. While deep learning has significantly advanced the analysis of mammographic images, challenges such as low contrast, image noise, and the high dimensionality of features often degrade model performance. Addressing these challenges, our study introduces a novel method integrating Genetic Algorithms (GA) with pre-trained Convolutional Neural Network (CNN) models to enhance feature selection and classification accuracy. Our approach involves a systematic process: first, we employ widely-used CNN architectures (VGG16, VGG19, MobileNet, and DenseNet) to extract a… More >

  • Open Access

    ARTICLE

    Deep Learning-Driven Anomaly Detection for IoMT-Based Smart Healthcare Systems

    Attiya Khan1, Muhammad Rizwan2, Ovidiu Bagdasar2,3, Abdulatif Alabdulatif4,*, Sulaiman Alamro4, Abdullah Alnajim5

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.3, pp. 2121-2141, 2024, DOI:10.32604/cmes.2024.054380 - 31 October 2024

    Abstract The Internet of Medical Things (IoMT) is an emerging technology that combines the Internet of Things (IoT) into the healthcare sector, which brings remarkable benefits to facilitate remote patient monitoring and reduce treatment costs. As IoMT devices become more scalable, Smart Healthcare Systems (SHS) have become increasingly vulnerable to cyberattacks. Intrusion Detection Systems (IDS) play a crucial role in maintaining network security. An IDS monitors systems or networks for suspicious activities or potential threats, safeguarding internal networks. This paper presents the development of an IDS based on deep learning techniques utilizing benchmark datasets. We propose More >

  • Open Access

    ARTICLE

    Multi-Lever Early Warning for Wind and Photovoltaic Power Ramp Events Based on Neural Network and Fuzzy Logic

    Huan Ma1, Linlin Ma2, Zengwei Wang3,*, Zhendong Li3, Yuanzhen Zhu1, Yutian Liu3

    Energy Engineering, Vol.121, No.11, pp. 3133-3160, 2024, DOI:10.32604/ee.2024.055051 - 21 October 2024

    Abstract With the increasing penetration of renewable energy in power system, renewable energy power ramp events (REPREs), dominated by wind power and photovoltaic power, pose significant threats to the secure and stable operation of power systems. This paper presents an early warning method for REPREs based on long short-term memory (LSTM) network and fuzzy logic. First, the warning levels of REPREs are defined by assessing the control costs of various power control measures. Then, the next 4-h power support capability of external grid is estimated by a tie line power prediction model, which is constructed based More > Graphic Abstract

    Multi-Lever Early Warning for Wind and Photovoltaic Power Ramp Events Based on Neural Network and Fuzzy Logic

  • Open Access

    ARTICLE

    An Efficient Long Short-Term Memory and Gated Recurrent Unit Based Smart Vessel Trajectory Prediction Using Automatic Identification System Data

    Umar Zaman1, Junaid Khan2, Eunkyu Lee1,3, Sajjad Hussain4, Awatef Salim Balobaid5, Rua Yahya Aburasain5, Kyungsup Kim1,2,*

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1789-1808, 2024, DOI:10.32604/cmc.2024.056222 - 15 October 2024

    Abstract Maritime transportation, a cornerstone of global trade, faces increasing safety challenges due to growing sea traffic volumes. This study proposes a novel approach to vessel trajectory prediction utilizing Automatic Identification System (AIS) data and advanced deep learning models, including Long Short-Term Memory (LSTM), Gated Recurrent Unit (GRU), Bidirectional LSTM (DBLSTM), Simple Recurrent Neural Network (SimpleRNN), and Kalman Filtering. The research implemented rigorous AIS data preprocessing, encompassing record deduplication, noise elimination, stationary simplification, and removal of insignificant trajectories. Models were trained using key navigational parameters: latitude, longitude, speed, and heading. Spatiotemporal aware processing through trajectory segmentation… More >

  • Open Access

    ARTICLE

    Cyber Security within Smart Cities: A Comprehensive Study and a Novel Intrusion Detection-Based Approach

    Mehdi Houichi1,*, Faouzi Jaidi1,2, Adel Bouhoula3

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 393-441, 2024, DOI:10.32604/cmc.2024.054007 - 15 October 2024

    Abstract The expansion of smart cities, facilitated by digital communications, has resulted in an enhancement of the quality of life and satisfaction among residents. The Internet of Things (IoT) continually generates vast amounts of data, which is subsequently analyzed to offer services to residents. The growth and development of IoT have given rise to a new paradigm. A smart city possesses the ability to consistently monitor and utilize the physical environment, providing intelligent services such as energy, transportation, healthcare, and entertainment for both residents and visitors. Research on the security and privacy of smart cities is… More >

  • Open Access

    ARTICLE

    Self-Attention Spatio-Temporal Deep Collaborative Network for Robust FDIA Detection in Smart Grids

    Tong Zu, Fengyong Li*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1395-1417, 2024, DOI:10.32604/cmes.2024.055442 - 27 September 2024

    Abstract False data injection attack (FDIA) can affect the state estimation of the power grid by tampering with the measured value of the power grid data, and then destroying the stable operation of the smart grid. Existing work usually trains a detection model by fusing the data-driven features from diverse power data streams. Data-driven features, however, cannot effectively capture the differences between noisy data and attack samples. As a result, slight noise disturbances in the power grid may cause a large number of false detections for FDIA attacks. To address this problem, this paper designs a… More >

Displaying 1-10 on page 1 of 485. Per Page