Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (75)
  • Open Access

    ARTICLE

    ChainApparel: A Trustworthy Blockchain and IoT-Based Traceability Framework for Apparel Industry 4.0

    Muhammad Shakeel Faridi1, Saqib Ali1,2,*, Guojun Wang2,*, Salman Afsar Awan1, Muhammad Zafar Iqbal3

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1837-1854, 2023, DOI:10.32604/cmc.2023.041929

    Abstract Trustworthiness and product traceability are essential factors in the apparel industry 4.0 for establishing successful business relationships among stakeholders such as customers, manufacturers, suppliers, and consumers. Each stakeholder has implemented different technology-based systems to record and track product transactions. However, these systems work in silos, and there is no intra-system communication, leading to a lack of complete supply chain traceability for all apparel stakeholders. Moreover, apparel stakeholders are reluctant to share their business information with business competitors; thus, they involve third-party auditors to ensure the quality of the final product. Furthermore, the apparel manufacturing industry faces challenges with counterfeit products,… More >

  • Open Access

    ARTICLE

    Leveraging Blockchain with Optimal Deep Learning-Based Drug Supply Chain Management for Pharmaceutical Industries

    Shanthi Perumalsamy, Venkatesh Kaliyamurthy*

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2341-2357, 2023, DOI:10.32604/cmc.2023.040269

    Abstract Due to its complexity and involvement of numerous stakeholders, the pharmaceutical supply chain presents many challenges that companies must overcome to deliver necessary medications to patients efficiently. The pharmaceutical supply chain poses different challenging issues, encompasses supply chain visibility, cold-chain shipping, drug counterfeiting, and rising prescription drug prices, which can considerably surge out-of-pocket patient costs. Blockchain (BC) offers the technical base for such a scheme, as it could track legitimate drugs and avoid fake circulation. The designers presented the procedure of BC with fabric for creating a secured drug supply-chain management (DSCM) method. With this motivation, the study presents a… More >

  • Open Access

    ARTICLE

    Strategic Contracting for Software Upgrade Outsourcing in Industry 4.0

    Cheng Wang1,2,*, Zhuowei Zheng1

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1563-1592, 2024, DOI:10.32604/cmes.2023.031103

    Abstract The advent of Industry 4.0 has compelled businesses to adopt digital approaches that combine software to enhance production efficiency. In this rapidly evolving market, software development is an ongoing process that must be tailored to meet the dynamic needs of enterprises. However, internal research and development can be prohibitively expensive, driving many enterprises to outsource software development and upgrades to external service providers. This paper presents a software upgrade outsourcing model for enterprises and service providers that accounts for the impact of market fluctuations on software adaptability. To mitigate the risk of adverse selection due to asymmetric information about the… More >

  • Open Access

    ARTICLE

    Gradient Optimizer Algorithm with Hybrid Deep Learning Based Failure Detection and Classification in the Industrial Environment

    Mohamed Zarouan1, Ibrahim M. Mehedi1,2,*, Shaikh Abdul Latif3, Md. Masud Rana4

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1341-1364, 2024, DOI:10.32604/cmes.2023.030037

    Abstract Failure detection is an essential task in industrial systems for preventing costly downtime and ensuring the seamless operation of the system. Current industrial processes are getting smarter with the emergence of Industry 4.0. Specifically, various modernized industrial processes have been equipped with quite a few sensors to collect process-based data to find faults arising or prevailing in processes along with monitoring the status of processes. Fault diagnosis of rotating machines serves a main role in the engineering field and industrial production. Due to the disadvantages of existing fault, diagnosis approaches, which greatly depend on professional experience and human knowledge, intellectual… More >

  • Open Access

    ARTICLE

    GMLP-IDS: A Novel Deep Learning-Based Intrusion Detection System for Smart Agriculture

    Abdelwahed Berguiga1,2,*, Ahlem Harchay1,2, Ayman Massaoudi1,2, Mossaad Ben Ayed3, Hafedh Belmabrouk4

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 379-402, 2023, DOI:10.32604/cmc.2023.041667

    Abstract Smart Agriculture, also known as Agricultural 5.0, is expected to be an integral part of our human lives to reduce the cost of agricultural inputs, increasing productivity and improving the quality of the final product. Indeed, the safety and ongoing maintenance of Smart Agriculture from cyber-attacks are vitally important. To provide more comprehensive protection against potential cyber-attacks, this paper proposes a new deep learning-based intrusion detection system for securing Smart Agriculture. The proposed Intrusion Detection System IDS, namely GMLP-IDS, combines the feedforward neural network Multilayer Perceptron (MLP) and the Gaussian Mixture Model (GMM) that can better protect the Smart Agriculture… More >

  • Open Access

    REVIEW

    Comprehensive Survey of the Landscape of Digital Twin Technologies and Their Diverse Applications

    Haiyu Chen1, Haijian Shao1,2,*, Xing Deng1, Lijuan Wang1, Xia Wang3

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 125-165, 2024, DOI:10.32604/cmes.2023.027834

    Abstract The concept of the digital twin, also known colloquially as the DT, is a fundamental principle within Industry 4.0 framework. In recent years, the concept of digital siblings has generated considerable academic and practical interest. However, academia and industry have used a variety of interpretations, and the scientific literature lacks a unified and consistent definition of this term. The purpose of this study is to systematically examine the definitional landscape of the digital twin concept as outlined in scholarly literature, beginning with its origins in the aerospace domain and extending to its contemporary interpretations in the manufacturing industry. Notably, this… More >

  • Open Access

    ARTICLE

    Enhancing Heavy Crude Oil Flow in Pipelines through Heating-Induced Viscosity Reduction in the Petroleum Industry

    Ramzy S. Hamied1,*, Anwar N. Mohammed Ali1, Khalid A. Sukkar2

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.8, pp. 2027-2039, 2023, DOI:10.32604/fdmp.2023.027312

    Abstract The process of transporting crude oil across pipelines is one of the most critical aspects of the midstream petroleum industry. In the present experimental work, the effect of temperature, pressure drop, and pipe diameter on the flow rate of heavy crude oil have been assessed. Moreover, the total discharge and energy losses have been evaluated in order to demonstrate the improvements potentially achievable by using solar heating method replacing pipe, and adjusting the value of the initial pressure difference. Crude oil of API = 20 has been used for the experiments, with the studied pipelines sections connecting the separator unit to… More > Graphic Abstract

    Enhancing Heavy Crude Oil Flow in Pipelines through Heating-Induced Viscosity Reduction in the Petroleum Industry

  • Open Access

    ARTICLE

    A Framework for Securing Saudi Arabian Hospital Industry: Vision-2030 Perspective

    Hosam Alhakami1,*, Abdullah Baz2, Mohammad Al-shareef3, Rajeev Kumar4, Alka Agrawal5, Raees Ahmad Khan5

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2773-2786, 2023, DOI:10.32604/iasc.2023.021560

    Abstract Recent transformation of Saudi Arabian healthcare sector into a revenue producing one has signaled several advancements in healthcare in the country. Transforming healthcare management into Smart hospital systems is one of them. Secure hospital management systems which are breach-proof only can be termed as effective smart hospital systems. Given the perspective of Saudi Vision-2030, many practitioners are trying to achieve a cost-effective hospital management system by using smart ideas. In this row, the proposed framework posits the main objectives for creating smart hospital management systems that can only be acknowledged by managing the security of healthcare data and medical practices.… More >

  • Open Access

    ARTICLE

    Aquila Optimization with Machine Learning-Based Anomaly Detection Technique in Cyber-Physical Systems

    A. Ramachandran1,*, K. Gayathri2, Ahmed Alkhayyat3, Rami Q. Malik4

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2177-2194, 2023, DOI:10.32604/csse.2023.034438

    Abstract Cyber-physical system (CPS) is a concept that integrates every computer-driven system interacting closely with its physical environment. Internet-of-things (IoT) is a union of devices and technologies that provide universal interconnection mechanisms between the physical and digital worlds. Since the complexity level of the CPS increases, an adversary attack becomes possible in several ways. Assuring security is a vital aspect of the CPS environment. Due to the massive surge in the data size, the design of anomaly detection techniques becomes a challenging issue, and domain-specific knowledge can be applied to resolve it. This article develops an Aquila Optimizer with Parameter Tuned… More >

  • Open Access

    ARTICLE

    A Blockchain-Based Architecture for Securing Industrial IoTs Data in Electric Smart Grid

    Samir M. Umran1,2, Songfeng Lu1,3, Zaid Ameen Abduljabbar1,4, Xueming Tang1,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5389-5416, 2023, DOI:10.32604/cmc.2023.034331

    Abstract There are numerous internet-connected devices attached to the industrial process through recent communication technologies, which enable machine-to-machine communication and the sharing of sensitive data through a new technology called the industrial internet of things (IIoTs). Most of the suggested security mechanisms are vulnerable to several cybersecurity threats due to their reliance on cloud-based services, external trusted authorities, and centralized architectures; they have high computation and communication costs, low performance, and are exposed to a single authority of failure and bottleneck. Blockchain technology (BC) is widely adopted in the industrial sector for its valuable features in terms of decentralization, security, and… More >

Displaying 1-10 on page 1 of 75. Per Page