Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (235)
  • Open Access

    REVIEW

    IoMT-Based Healthcare Systems: A Review

    Tahir Abbas1,*, Ali Haider Khan2, Khadija Kanwal3, Ali Daud4,*, Muhammad Irfan5, Amal Bukhari6, Riad Alharbey6

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 871-895, 2024, DOI:10.32604/csse.2024.049026

    Abstract The integration of the Internet of Medical Things (IoMT) and the Internet of Things (IoT), which has revolutionized patient care through features like remote critical care and real-time therapy, is examined in this study in response to the changing healthcare landscape. Even with these improvements, security threats are associated with the increased connectivity of medical equipment, which calls for a thorough assessment. With a primary focus on addressing security and performance enhancement challenges, the research classifies current IoT communication devices, examines their applications in IoMT, and investigates important aspects of IoMT devices in healthcare. The More >

  • Open Access

    ARTICLE

    Intrusion Detection System for Smart Industrial Environments with Ensemble Feature Selection and Deep Convolutional Neural Networks

    Asad Raza1,*, Shahzad Memon1, Muhammad Ali Nizamani1, Mahmood Hussain Shah2

    Intelligent Automation & Soft Computing, Vol.39, No.3, pp. 545-566, 2024, DOI:10.32604/iasc.2024.051779

    Abstract Smart Industrial environments use the Industrial Internet of Things (IIoT) for their routine operations and transform their industrial operations with intelligent and driven approaches. However, IIoT devices are vulnerable to cyber threats and exploits due to their connectivity with the internet. Traditional signature-based IDS are effective in detecting known attacks, but they are unable to detect unknown emerging attacks. Therefore, there is the need for an IDS which can learn from data and detect new threats. Ensemble Machine Learning (ML) and individual Deep Learning (DL) based IDS have been developed, and these individual models achieved… More >

  • Open Access

    ARTICLE

    In-Depth Study of Potential-Based Routing and New Exploration of Its Scheduling Integration

    Jihoon Sung1, Yeunwoong Kyung2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2891-2911, 2024, DOI:10.32604/cmes.2024.051772

    Abstract Industrial wireless mesh networks (WMNs) have been widely deployed in various industrial sectors, providing services such as manufacturing process monitoring, equipment control, and sensor data collection. A notable characteristic of industrial WMNs is their distinct traffic pattern, where the majority of traffic flows originate from mesh nodes and are directed towards mesh gateways. In this context, this paper adopts and revisits a routing algorithm known as ALFA (autonomous load-balancing field-based anycast routing), tailored specifically for anycast (one-to-one-of-many) networking in WMNs, where traffic flows can be served through any one of multiple gateways. In essence, the… More >

  • Open Access

    ARTICLE

    A New Industrial Intrusion Detection Method Based on CNN-BiLSTM

    Jun Wang, Changfu Si, Zhen Wang, Qiang Fu*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4297-4318, 2024, DOI:10.32604/cmc.2024.050223

    Abstract Nowadays, with the rapid development of industrial Internet technology, on the one hand, advanced industrial control systems (ICS) have improved industrial production efficiency. However, there are more and more cyber-attacks targeting industrial control systems. To ensure the security of industrial networks, intrusion detection systems have been widely used in industrial control systems, and deep neural networks have always been an effective method for identifying cyber attacks. Current intrusion detection methods still suffer from low accuracy and a high false alarm rate. Therefore, it is important to build a more efficient intrusion detection model. This paper… More >

  • Open Access

    REVIEW

    A Review of Hybrid Cyber Threats Modelling and Detection Using Artificial Intelligence in IIoT

    Yifan Liu1, Shancang Li1,*, Xinheng Wang2, Li Xu3

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.2, pp. 1233-1261, 2024, DOI:10.32604/cmes.2024.046473

    Abstract The Industrial Internet of Things (IIoT) has brought numerous benefits, such as improved efficiency, smart analytics, and increased automation. However, it also exposes connected devices, users, applications, and data generated to cyber security threats that need to be addressed. This work investigates hybrid cyber threats (HCTs), which are now working on an entirely new level with the increasingly adopted IIoT. This work focuses on emerging methods to model, detect, and defend against hybrid cyber attacks using machine learning (ML) techniques. Specifically, a novel ML-based HCT modelling and analysis framework was proposed, in which regularisation and Random Forest were More >

  • Open Access

    CORRECTION

    Correction: Micro-Locational Fine Dust Prediction Utilizing Machine Learning and Deep Learning Models

    Seoyun Kim1,#, Hyerim Yu2,#, Jeewoo Yoon1,3, Eunil Park1,2,*

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 861-861, 2024, DOI:10.32604/csse.2024.053659

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    Machine Learning Empowered Security and Privacy Architecture for IoT Networks with the Integration of Blockchain

    Sohaib Latif1,*, M. Saad Bin Ilyas1, Azhar Imran2, Hamad Ali Abosaq3, Abdulaziz Alzubaidi4, Vincent Karovič Jr.5

    Intelligent Automation & Soft Computing, Vol.39, No.2, pp. 353-379, 2024, DOI:10.32604/iasc.2024.047080

    Abstract The Internet of Things (IoT) is growing rapidly and impacting almost every aspect of our lives, from wearables and healthcare to security, traffic management, and fleet management systems. This has generated massive volumes of data and security, and data privacy risks are increasing with the advancement of technology and network connections. Traditional access control solutions are inadequate for establishing access control in IoT systems to provide data protection owing to their vulnerability to single-point OF failure. Additionally, conventional privacy preservation methods have high latency costs and overhead for resource-constrained devices. Previous machine learning approaches were… More >

  • Open Access

    ARTICLE

    Design Pattern and Challenges of Federated Learning with Applications in Industrial Control System

    Hina Batool1, Jiuyun Xu1,*, Ateeq Ur Rehman2, Habib Hamam3,4,5,6

    Journal on Artificial Intelligence, Vol.6, pp. 105-128, 2024, DOI:10.32604/jai.2024.049912

    Abstract Federated Learning (FL) appeared as an encouraging approach for handling decentralized data. Creating a FL system needs both machine learning (ML) knowledge and thinking about how to design system software. Researchers have focused a lot on the ML side of FL, but have not paid enough attention to designing the software architecture. So, in this survey, a set of design patterns is described to tackle the design issues. Design patterns are like reusable solutions for common problems that come up when designing software architecture. This paper focuses on (1) design patterns such as architectures, frameworks,… More >

  • Open Access

    ARTICLE

    The Effect of Key Nodes on the Malware Dynamics in the Industrial Control Network

    Qiang Fu1, Jun Wang1,*, Changfu Si1, Jiawei Liu2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 329-349, 2024, DOI:10.32604/cmc.2024.048117

    Abstract As industrialization and informatization become more deeply intertwined, industrial control networks have entered an era of intelligence. The connection between industrial control networks and the external internet is becoming increasingly close, which leads to frequent security accidents. This paper proposes a model for the industrial control network. It includes a malware containment strategy that integrates intrusion detection, quarantine, and monitoring. Based on this model, the role of key nodes in the spread of malware is studied, a comparison experiment is conducted to validate the impact of the containment strategy. In addition, the dynamic behavior of… More >

  • Open Access

    ARTICLE

    Enhancing the Performance of Polylactic Acid (PLA) Reinforcing with Sawdust, Rice Husk, and Bagasse Particles

    A. MADHAN KUMAR1, K. JAYAKUMAR2,*, M. SHALINI3

    Journal of Polymer Materials, Vol.39, No.3-4, pp. 269-281, 2022, DOI:10.32381/JPM.2022.39.3-4.7

    Abstract Polylactic acid (PLA) is the most popular thermoplastic biopolymer providing a stiffness and strength alternative to fossil-based plastics. It is also the most promising biodegradable polymer on the market right now, thus gaining a substitute for conservative artificial polymers. Therefore, the current research focuses on synthesizing and mechanical characterization of particlereinforced PLA composites. The hot compression molding technique was used to fabricate PLA-based composites with 0, 2.5, 5, and 7.5 weight % of sawdust, rice husk, and bagasse particle reinforcements to enhance the performance of the PLA. The pellets of PLA matrix were taken with… More >

Displaying 1-10 on page 1 of 235. Per Page