Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (639)
  • Open Access

    ARTICLE

    A Secure Blockchain-Based Vehicular Collision Avoidance Protocol: Detecting and Preventing Blackhole Attacks

    Mosab Manaseer1, Maram Bani Younes2,*

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1699-1721, 2024, DOI:10.32604/csse.2024.055128 - 22 November 2024

    Abstract This work aims to examine the vulnerabilities and threats in the applications of intelligent transport systems, especially collision avoidance protocols. It focuses on achieving the availability of network communication among traveling vehicles. Finally, it aims to find a secure solution to prevent blackhole attacks on vehicular network communications. The proposed solution relies on authenticating vehicles by joining a blockchain network. This technology provides identification information and receives cryptography keys. Moreover, the ad hoc on-demand distance vector (AODV) protocol is used for route discovery and ensuring reliable node communication. The system activates an adaptive mode for monitoring More >

  • Open Access

    REVIEW

    A Systematic Literature Review on Blockchain Consensus Mechanisms’ Security: Applications and Open Challenges

    Muhammad Muntasir Yakubu1,2,*, Mohd Fadzil B Hassan1,3, Kamaluddeen Usman Danyaro1, Aisha Zahid Junejo4, Muhammed Siraj5, Saidu Yahaya1, Shamsuddeen Adamu1, Kamal Abdulsalam6

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1437-1481, 2024, DOI:10.32604/csse.2024.054556 - 22 November 2024

    Abstract This study conducts a systematic literature review (SLR) of blockchain consensus mechanisms, an essential protocols that maintain the integrity, reliability, and decentralization of distributed ledger networks. The aim is to comprehensively investigate prominent mechanisms’ security features and vulnerabilities, emphasizing their security considerations, applications, challenges, and future directions. The existing literature offers valuable insights into various consensus mechanisms’ strengths, limitations, and security vulnerabilities and their real-world applications. However, there remains a gap in synthesizing and analyzing this knowledge systematically. Addressing this gap would facilitate a structured approach to understanding consensus mechanisms’ security and vulnerabilities comprehensively. The… More >

  • Open Access

    ARTICLE

    Improved Double Deep Q Network Algorithm Based on Average Q-Value Estimation and Reward Redistribution for Robot Path Planning

    Yameng Yin1, Lieping Zhang2,*, Xiaoxu Shi1, Yilin Wang3, Jiansheng Peng4, Jianchu Zou4

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2769-2790, 2024, DOI:10.32604/cmc.2024.056791 - 18 November 2024

    Abstract By integrating deep neural networks with reinforcement learning, the Double Deep Q Network (DDQN) algorithm overcomes the limitations of Q-learning in handling continuous spaces and is widely applied in the path planning of mobile robots. However, the traditional DDQN algorithm suffers from sparse rewards and inefficient utilization of high-quality data. Targeting those problems, an improved DDQN algorithm based on average Q-value estimation and reward redistribution was proposed. First, to enhance the precision of the target Q-value, the average of multiple previously learned Q-values from the target Q network is used to replace the single Q-value… More >

  • Open Access

    ARTICLE

    Integrated Energy-Efficient Distributed Link Stability Algorithm for UAV Networks

    Altaf Hussain1, Shuaiyong Li2, Tariq Hussain3, Razaz Waheeb Attar4, Farman Ali5,*, Ahmed Alhomoud6, Babar Shah7

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2357-2394, 2024, DOI:10.32604/cmc.2024.056694 - 18 November 2024

    Abstract Ad hoc networks offer promising applications due to their ease of use, installation, and deployment, as they do not require a centralized control entity. In these networks, nodes function as senders, receivers, and routers. One such network is the Flying Ad hoc Network (FANET), where nodes operate in three dimensions (3D) using Unmanned Aerial Vehicles (UAVs) that are remotely controlled. With the integration of the Internet of Things (IoT), these nodes form an IoT-enabled network called the Internet of UAVs (IoU). However, the airborne nodes in FANET consume high energy due to their payloads and… More >

  • Open Access

    ARTICLE

    DAUNet: Detail-Aware U-Shaped Network for 2D Human Pose Estimation

    Xi Li1,2, Yuxin Li2, Zhenhua Xiao3,*, Zhenghua Huang1, Lianying Zou1

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3325-3349, 2024, DOI:10.32604/cmc.2024.056464 - 18 November 2024

    Abstract Human pose estimation is a critical research area in the field of computer vision, playing a significant role in applications such as human-computer interaction, behavior analysis, and action recognition. In this paper, we propose a U-shaped keypoint detection network (DAUNet) based on an improved ResNet subsampling structure and spatial grouping mechanism. This network addresses key challenges in traditional methods, such as information loss, large network redundancy, and insufficient sensitivity to low-resolution features. DAUNet is composed of three main components. First, we introduce an improved BottleNeck block that employs partial convolution and strip pooling to reduce… More >

  • Open Access

    ARTICLE

    Special Vehicle Target Detection and Tracking Based on Virtual Simulation Environment and YOLOv5-Block+DeepSort Algorithm

    Mingyuan Zhai1,2, Hanquan Zhang1, Le Wang1, Dong Xiao1,*, Zhengmin Gu3, Zhenni Li1

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3241-3260, 2024, DOI:10.32604/cmc.2024.056241 - 18 November 2024

    Abstract In the process of dense vehicles traveling fast, there will be mutual occlusion between vehicles, which will lead to the problem of deterioration of the tracking effect of different vehicles, so this paper proposes a research method of virtual simulation video vehicle target tracking based on you only look once (YOLO)v5s and deep simple online and realtime tracking (DeepSort). Given that the DeepSort algorithm is currently the most effective tracking method, this paper merges the YOLOv5 algorithm with the DeepSort algorithm. Then it adds the efficient channel attention networks (ECA-Net) focusing mechanism at the back… More >

  • Open Access

    ARTICLE

    A Combined Method of Temporal Convolutional Mechanism and Wavelet Decomposition for State Estimation of Photovoltaic Power Plants

    Shaoxiong Wu1, Ruoxin Li1, Xiaofeng Tao1, Hailong Wu1,*, Ping Miao1, Yang Lu1, Yanyan Lu1, Qi Liu2, Li Pan2

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3063-3077, 2024, DOI:10.32604/cmc.2024.055381 - 18 November 2024

    Abstract Time series prediction has always been an important problem in the field of machine learning. Among them, power load forecasting plays a crucial role in identifying the behavior of photovoltaic power plants and regulating their control strategies. Traditional power load forecasting often has poor feature extraction performance for long time series. In this paper, a new deep learning framework Residual Stacked Temporal Long Short-Term Memory (RST-LSTM) is proposed, which combines wavelet decomposition and time convolutional memory network to solve the problem of feature extraction for long sequences. The network framework of RST-LSTM consists of two More >

  • Open Access

    ARTICLE

    Trust Score-Based Malicious Vehicle Detection Scheme in Vehicular Network Environments

    Wenming Wang1,2,3,*, Zhiquan Liu1, Shumin Zhang1, Guijiang Liu1

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2517-2545, 2024, DOI:10.32604/cmc.2024.055184 - 18 November 2024

    Abstract Advancements in the vehicular network technology enable real-time interconnection, data sharing, and intelligent cooperative driving among vehicles. However, malicious vehicles providing illegal and incorrect information can compromise the interests of vehicle users. Trust mechanisms serve as an effective solution to this issue. In recent years, many researchers have incorporated blockchain technology to manage and incentivize vehicle nodes, incurring significant overhead and storage requirements due to the frequent ingress and egress of vehicles within the area. In this paper, we propose a distributed vehicular network scheme based on trust scores. Specifically, the designed architecture partitions multiple More >

  • Open Access

    ARTICLE

    A Novel Hybrid Architecture for Superior IoT Threat Detection through Real IoT Environments

    Bassam Mohammad Elzaghmouri1, Yosef Hasan Fayez Jbara2, Said Elaiwat3, Nisreen Innab4,*, Ahmed Abdelgader Fadol Osman5, Mohammed Awad Mohammed Ataelfadiel5, Farah H. Zawaideh6, Mouiad Fadeil Alawneh7, Asef Al-Khateeb8, Marwan Abu-Zanona8

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2299-2316, 2024, DOI:10.32604/cmc.2024.054836 - 18 November 2024

    Abstract As the Internet of Things (IoT) continues to expand, incorporating a vast array of devices into a digital ecosystem also increases the risk of cyber threats, necessitating robust defense mechanisms. This paper presents an innovative hybrid deep learning architecture that excels at detecting IoT threats in real-world settings. Our proposed model combines Convolutional Neural Networks (CNN), Bidirectional Long Short-Term Memory (BLSTM), Gated Recurrent Units (GRU), and Attention mechanisms into a cohesive framework. This integrated structure aims to enhance the detection and classification of complex cyber threats while accommodating the operational constraints of diverse IoT systems.… More >

  • Open Access

    PROCEEDINGS

    Research on the Synergistic Mechanism of Photothermal-Chemotherapy-Immunotherapy of Multi-Functional Nanoparticles Against Gastric Cancer

    Erdong Shen1, Ting Pan1, Pan Guo1, Ke Chen1, Rui Xu1, Mei Yang1, Dahe Zhan1, Fang Fang1, Qinghui Wu1,*, Jianbing Hu1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.30, No.4, pp. 1-3, 2024, DOI:10.32604/icces.2024.012772

    Abstract Objective
    This study investigates the synergistic effects of a novel multifunctional nanoparticle on gastric cancer treatment through photothermal therapy, chemotherapy, and immunotherapy.

    Method
    Synthesize hollow mesoporous Prussian blue nanoparticles and load them with luteolin. Use exosomes to encapsulate the nanoparticles and modify the surface of the targeted peptide GX1. Detect the morphology of nanoparticles using a nanoparticle size analyzer and transmission electron microscopy. Use Coomassie Brilliant Blue to detect the effect of extracellular vesicle encapsulation. Detect the thermal conversion efficiency of nanoparticles under specific laser irradiation through infrared and ultraviolet spectroscopy, as well as the release rate… More >

Displaying 1-10 on page 1 of 639. Per Page