Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (11)
  • Open Access

    ARTICLE

    Enhancing Security and Privacy in Distributed Face Recognition Systems through Blockchain and GAN Technologies

    Muhammad Ahmad Nawaz Ul Ghani1, Kun She1,*, Muhammad Arslan Rauf1, Shumaila Khan2, Javed Ali Khan3, Eman Abdullah Aldakheel4, Doaa Sami Khafaga4

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2609-2623, 2024, DOI:10.32604/cmc.2024.049611 - 15 May 2024

    Abstract The use of privacy-enhanced facial recognition has increased in response to growing concerns about data security and privacy in the digital age. This trend is spurred by rising demand for face recognition technology in a variety of industries, including access control, law enforcement, surveillance, and internet communication. However, the growing usage of face recognition technology has created serious concerns about data monitoring and user privacy preferences, especially in context-aware systems. In response to these problems, this study provides a novel framework that integrates sophisticated approaches such as Generative Adversarial Networks (GANs), Blockchain, and distributed computing… More >

  • Open Access

    ARTICLE

    A Novel High-Efficiency Transaction Verification Scheme for Blockchain Systems

    Jingyu Zhang1,2, Pian Zhou1, Jin Wang1, Osama Alfarraj3, Saurabh Singh4, Min Zhu5,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1613-1633, 2024, DOI:10.32604/cmes.2023.044418 - 29 January 2024

    Abstract Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system. This technology has been widely used and has developed rapidly in big data systems across various fields. An increasing number of users are participating in application systems that use blockchain as their underlying architecture. As the number of transactions and the capital involved in blockchain grow, ensuring information security becomes imperative. Addressing the verification of transactional information security and privacy has emerged as a critical challenge. Blockchain-based verification methods can effectively eliminate the need… More >

  • Open Access

    ARTICLE

    Fault Tolerance in the Joint EDF-RMS Algorithm: A Comparative Simulation Study

    Rashmi Sharma1, Nitin Nitin2, Deepak Dahiya3,*

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5197-5213, 2022, DOI:10.32604/cmc.2022.025059 - 21 April 2022

    Abstract Failure is a systemic error that affects overall system performance and may eventually crash across the entire configuration. In Real-Time Systems (RTS), deadline is the key to successful completion of the program. If tasks effectively meet the deadline, it means the system is working in pristine order. However, missing the deadline means a systemic fault due to which the system can crash (hard RTS) or degrade inclusive performance (soft RTS). To fine-tune the RTS, tolerance is the critical issue and must be handled with extreme care. This article explains the context of fault tolerance with… More >

  • Open Access

    ARTICLE

    Deep Learning Enabled Predictive Model for P2P Energy Trading in TEM

    Pudi Sekhar1, T. J. Benedict Jose2, Velmurugan Subbiah Parvathy3, E. Laxmi Lydia4, Seifedine Kadry5, Kuntha Pin6, Yunyoung Nam7,*

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1473-1487, 2022, DOI:10.32604/cmc.2022.022110 - 03 November 2021

    Abstract With the incorporation of distributed energy systems in the electric grid, transactive energy market (TEM) has become popular in balancing the demand as well as supply adaptively over the grid. The classical grid can be updated to the smart grid by the integration of Information and Communication Technology (ICT) over the grids. The TEM allows the Peer-to-Peer (P2P) energy trading in the grid that effectually connects the consumer and prosumer to trade energy among them. At the same time, there is a need to predict the load for effectual P2P energy trading and can be… More >

  • Open Access

    ARTICLE

    An Optimal Distribution of RSU for Improving Self-Driving Vehicle Connectivity

    Khattab Alheeti1, Abdulkareem Alaloosy1, Haitham Khalaf2, Abdulkareem Alzahrani3,*, Duaa Al_Dosary4

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3311-3319, 2022, DOI:10.32604/cmc.2022.019773 - 27 September 2021

    Abstract Self-driving and semi-self-driving cars play an important role in our daily lives. The effectiveness of these cars is based heavily on the use of their surrounding areas to collect sensitive and vital information. However, external infrastructures also play significant roles in the transmission and reception of control data, cooperative awareness messages, and caution notifications. In this case, roadside units are considered one of the most important communication peripherals. Random distribution of these infrastructures will overburden the spread of self-driving vehicles in terms of cost, bandwidth, connectivity, and radio coverage area. In this paper, a new More >

  • Open Access

    ARTICLE

    Average Convergence for Directed & Undirected Graphs in Distributed Systems

    Ali Mustafa1,2, M Najam ul Islam1, Salman Ahmed1,3,*

    Computer Systems Science and Engineering, Vol.37, No.3, pp. 399-413, 2021, DOI:10.32604/csse.2021.015575 - 08 March 2021

    Abstract Consensus control of multi-agent systems is an innovative paradigm for the development of intelligent distributed systems. This has fascinated numerous scientific groups for their promising applications as they have the freedom to achieve their local and global goals and make their own decisions. Network communication topologies based on graph and matrix theory are widely used in a various real-time applications ranging from software agents to robotics. Therefore, while sustaining the significance of both directed and undirected graphs, this research emphases on the demonstration of a distributed average consensus algorithm. It uses the harmonic mean in… More >

  • Open Access

    ARTICLE

    A Storage Optimization Scheme for Blockchain Transaction Databases

    Jingyu Zhang1,2, Siqi Zhong1, Jin Wang1,3, Xiaofeng Yu4,*, Osama Alfarraj5

    Computer Systems Science and Engineering, Vol.36, No.3, pp. 521-535, 2021, DOI:10.32604/csse.2021.014530 - 18 January 2021

    Abstract As the typical peer-to-peer distributed networks, blockchain systems require each node to copy a complete transaction database, so as to ensure new transactions can by verified independently. In a blockchain system (e.g., bitcoin system), the node does not rely on any central organization, and every node keeps an entire copy of the transaction database. However, this feature determines that the size of blockchain transaction database is growing rapidly. Therefore, with the continuous system operations, the node memory also needs to be expanded to support the system running. Especially in the big data era, the increasing More >

  • Open Access

    ARTICLE

    Memetic Optimization with Cryptographic Encryption for Secure Medical Data Transmission in IoT-Based Distributed Systems

    Srinath Doss1, Jothi Paranthaman2, Suseendran Gopalakrishnan3, Akila Duraisamy3, Souvik Pal4, Balaganesh Duraisamy5, Chung Le Van6,*, Dac-Nhuong Le7

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1577-1594, 2021, DOI:10.32604/cmc.2020.012379 - 26 November 2020

    Abstract In the healthcare system, the Internet of Things (IoT) based distributed systems play a vital role in transferring the medical-related documents and information among the organizations to reduce the replication in medical tests. This datum is sensitive, and hence security is a must in transforming the sensational contents. In this paper, an Evolutionary Algorithm, namely the Memetic Algorithm is used for encrypting the text messages. The encrypted information is then inserted into the medical images using Discrete Wavelet Transform 1 level and 2 levels. The reverse method of the Memetic Algorithm is implemented when extracting More >

  • Open Access

    ARTICLE

    Improving Availability in Component-Based Distributed Systems

    Fahd N. Al-Wesabi*

    Intelligent Automation & Soft Computing, Vol.26, No.6, pp. 1345-1357, 2020, DOI:10.32604/iasc.2020.013835 - 24 December 2020

    Abstract Assuring high availability is an important factor to develop component-based systems, particularly when different workloads and configurations are common. Several methods have been proposed in the literature to redeploy and replicate software components to find the best deployment architecture that guarantees high availability of component-based systems. In this paper, an extended method has been proposed to improve the availability of component-based systems by adding new CPU factors. The proposed method has been implemented by a self-developed program and using a java programming language with Eclipse KEPLER. Several simulations and experiment scenarios have been performed to… More >

  • Open Access

    ARTICLE

    Security and Privacy Frameworks for Access Control Big Data Systems

    Paolina Centonze1,*

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 361-374, 2019, DOI:10.32604/cmc.2019.06223

    Abstract In the security and privacy fields, Access Control (AC) systems are viewed as the fundamental aspects of networking security mechanisms. Enforcing AC becomes even more challenging when researchers and data analysts have to analyze complex and distributed Big Data (BD) processing cluster frameworks, which are adopted to manage yottabyte of unstructured sensitive data. For instance, Big Data systems’ privacy and security restrictions are most likely to failure due to the malformed AC policy configurations. Furthermore, BD systems were initially developed toped to take care of some of the DB issues to address BD challenges and… More >

Displaying 1-10 on page 1 of 11. Per Page