Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (26)
  • Open Access

    ARTICLE

    Leveraging Sharding-Based Hybrid Consensus for Blockchain

    Hind Baageel1, Md Mahfuzur Rahman1,2,*

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1215-1233, 2024, DOI:10.32604/cmc.2024.055908 - 15 October 2024

    Abstract The advent of blockchain technology has transformed traditional methods of information exchange, shifting reliance from centralized data centers to decentralized frameworks. While blockchain’s decentralization and security are strengths, traditional consensus mechanisms like Proof of Work (PoW) and Proof of Stake (PoS) face limitations in scalability. PoW achieves decentralization and security but struggles with scalability as transaction volumes grow, while PoS enhances scalability, but risks centralization due to monopolization by high-stake participants. Sharding, a recent advancement in blockchain technology, addresses scalability by partitioning the network into shards that process transactions independently, thereby improving throughput and reducing… More >

  • Open Access

    ARTICLE

    Designing a Secure and Scalable Data Sharing Mechanism Using Decentralized Identifiers (DID)

    Iuon-Chang Lin1, I-Ling Yeh1, Ching-Chun Chang2, Jui-Chuan Liu3, Chin-Chen Chang3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 809-822, 2024, DOI:10.32604/cmes.2024.051612 - 20 August 2024

    Abstract Centralized storage and identity identification methods pose many risks, including hacker attacks, data misuse, and single points of failure. Additionally, existing centralized identity management methods face interoperability issues and rely on a single identity provider, leaving users without control over their identities. Therefore, this paper proposes a mechanism for identity identification and data sharing based on decentralized identifiers. The scheme utilizes blockchain technology to store the identifiers and data hashed on the chain to ensure permanent identity recognition and data integrity. Data is stored on InterPlanetary File System (IPFS) to avoid the risk of single More >

  • Open Access

    ARTICLE

    Transparent and Accountable Training Data Sharing in Decentralized Machine Learning Systems

    Siwan Noh1, Kyung-Hyune Rhee2,*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3805-3826, 2024, DOI:10.32604/cmc.2024.050949 - 20 June 2024

    Abstract In Decentralized Machine Learning (DML) systems, system participants contribute their resources to assist others in developing machine learning solutions. Identifying malicious contributions in DML systems is challenging, which has led to the exploration of blockchain technology. Blockchain leverages its transparency and immutability to record the provenance and reliability of training data. However, storing massive datasets or implementing model evaluation processes on smart contracts incurs high computational costs. Additionally, current research on preventing malicious contributions in DML systems primarily focuses on protecting models from being exploited by workers who contribute incorrect or misleading data. However, less… More >

  • Open Access

    REVIEW

    Economic Power Dispatching from Distributed Generations: Review of Optimization Techniques

    Paramjeet Kaur1, Krishna Teerth Chaturvedi1, Mohan Lal Kolhe2,*

    Energy Engineering, Vol.121, No.3, pp. 557-579, 2024, DOI:10.32604/ee.2024.043159 - 27 February 2024

    Abstract In the increasingly decentralized energy environment, economical power dispatching from distributed generations (DGs) is crucial to minimizing operating costs, optimizing resource utilization, and guaranteeing a consistent and sustainable supply of electricity. A comprehensive review of optimization techniques for economic power dispatching from distributed generations is imperative to identify the most effective strategies for minimizing operational costs while maintaining grid stability and sustainability. The choice of optimization technique for economic power dispatching from DGs depends on a number of factors, such as the size and complexity of the power system, the availability of computational resources, and… More >

  • Open Access

    ARTICLE

    On Designs of Decentralized Reputation Management for Permissioned Blockchain Networks

    Jinyu Chen1, Long Shi1,*, Qisheng Huang2, Taotao Wang3, Daojing He4

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1755-1773, 2024, DOI:10.32604/cmes.2023.046826 - 29 January 2024

    Abstract In permissioned blockchain networks, the Proof of Authority (PoA) consensus, which uses the election of authorized nodes to validate transactions and blocks, has been widely advocated thanks to its high transaction throughput and fault tolerance. However, PoA suffers from the drawback of centralization dominated by a limited number of authorized nodes and the lack of anonymity due to the round-robin block proposal mechanism. As a result, traditional PoA is vulnerable to a single point of failure that compromises the security of the blockchain network. To address these issues, we propose a novel decentralized reputation management… More > Graphic Abstract

    On Designs of Decentralized Reputation Management for Permissioned Blockchain Networks

  • Open Access

    REVIEW

    A Review on the Security of the Ethereum-Based DeFi Ecosystem

    Yue Xue1, Dunqiu Fan2, Shen Su1,3,*, Jialu Fu1, Ning Hu1, Wenmao Liu2, Zhihong Tian1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.1, pp. 69-101, 2024, DOI:10.32604/cmes.2023.031488 - 30 December 2023

    Abstract Decentralized finance (DeFi) is a general term for a series of financial products and services. It is based on blockchain technology and has attracted people’s attention because of its open, transparent, and intermediary free. Among them, the DeFi ecosystem based on Ethereum-based blockchains attracts the most attention. However, the current decentralized financial system built on the Ethereum architecture has been exposed to many smart contract vulnerabilities during the last few years. Herein, we believe it is time to improve the understanding of the prevailing Ethereum-based DeFi ecosystem security issues. To that end, we investigate the More >

  • Open Access

    ARTICLE

    Decentralized Heterogeneous Federal Distillation Learning Based on Blockchain

    Hong Zhu*, Lisha Gao, Yitian Sha, Nan Xiang, Yue Wu, Shuo Han

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3363-3377, 2023, DOI:10.32604/cmc.2023.040731 - 08 October 2023

    Abstract Load forecasting is a crucial aspect of intelligent Virtual Power Plant (VPP) management and a means of balancing the relationship between distributed power grids and traditional power grids. However, due to the continuous emergence of power consumption peaks, the power supply quality of the power grid cannot be guaranteed. Therefore, an intelligent calculation method is required to effectively predict the load, enabling better power grid dispatching and ensuring the stable operation of the power grid. This paper proposes a decentralized heterogeneous federated distillation learning algorithm (DHFDL) to promote trusted federated learning (FL) between different federates… More >

  • Open Access

    ARTICLE

    Edge of Things Inspired Robust Intrusion Detection Framework for Scalable and Decentralized Applications

    Abdulaziz Aldribi1,2,*, Aman Singh2,3, Jose Breñosa3,4

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3865-3881, 2023, DOI:10.32604/csse.2023.037748 - 03 April 2023

    Abstract Ubiquitous data monitoring and processing with minimal latency is one of the crucial challenges in real-time and scalable applications. Internet of Things (IoT), fog computing, edge computing, cloud computing, and the edge of things are the spine of all real-time and scalable applications. Conspicuously, this study proposed a novel framework for a real-time and scalable application that changes dynamically with time. In this study, IoT deployment is recommended for data acquisition. The Pre-Processing of data with local edge and fog nodes is implemented in this study. The threshold-oriented data classification method is deployed to improve… More >

  • Open Access

    ARTICLE

    COVID-19 Classification from X-Ray Images: An Approach to Implement Federated Learning on Decentralized Dataset

    Ali Akbar Siddique1, S. M. Umar Talha1, M. Aamir1, Abeer D. Algarni2, Naglaa F. Soliman2,*, Walid El-Shafai3,4

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3883-3901, 2023, DOI:10.32604/cmc.2023.037413 - 31 March 2023

    Abstract The COVID-19 pandemic has devastated our daily lives, leaving horrific repercussions in its aftermath. Due to its rapid spread, it was quite difficult for medical personnel to diagnose it in such a big quantity. Patients who test positive for Covid-19 are diagnosed via a nasal PCR test. In comparison, polymerase chain reaction (PCR) findings take a few hours to a few days. The PCR test is expensive, although the government may bear expenses in certain places. Furthermore, subsets of the population resist invasive testing like swabs. Therefore, chest X-rays or Computerized Vomography (CT) scans are… More >

  • Open Access

    ARTICLE

    Blockchain-Based Decentralized Authentication Model for IoT-Based E-Learning and Educational Environments

    Osama A. Khashan1,*, Sultan Alamri2, Waleed Alomoush3, Mutasem K. Alsmadi4, Samer Atawneh2, Usama Mir5

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3133-3158, 2023, DOI:10.32604/cmc.2023.036217 - 31 March 2023

    Abstract In recent times, technology has advanced significantly and is currently being integrated into educational environments to facilitate distance learning and interaction between learners. Integrating the Internet of Things (IoT) into education can facilitate the teaching and learning process and expand the context in which students learn. Nevertheless, learning data is very sensitive and must be protected when transmitted over the network or stored in data centers. Moreover, the identity and the authenticity of interacting students, instructors, and staff need to be verified to mitigate the impact of attacks. However, most of the current security and… More >

Displaying 1-10 on page 1 of 26. Per Page