Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (13)
  • Open Access

    ARTICLE

    WebFLex: A Framework for Web Browsers-Based Peer-to-Peer Federated Learning Systems Using WebRTC

    Mai Alzamel1,*, Hamza Ali Rizvi2, Najwa Altwaijry1, Isra Al-Turaiki1

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4177-4204, 2024, DOI:10.32604/cmc.2024.048370

    Abstract Scalability and information personal privacy are vital for training and deploying large-scale deep learning models. Federated learning trains models on exclusive information by aggregating weights from various devices and taking advantage of the device-agnostic environment of web browsers. Nevertheless, relying on a main central server for internet browser-based federated systems can prohibit scalability and interfere with the training process as a result of growing client numbers. Additionally, information relating to the training dataset can possibly be extracted from the distributed weights, potentially reducing the privacy of the local data used for training. In this research paper, we aim to investigate… More >

  • Open Access

    ARTICLE

    “Half of the Node Records Are Forged?”: The Problem of Node Records Forgery in Ethereum Network

    Yang Liu1,2,*, Zhiyuan Lin1, Yuxi Zhang1, Lin Jiang1,*, Xuan Wang1,3

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1713-1729, 2024, DOI:10.32604/cmes.2023.030468

    Abstract Ethereum, currently the most widely utilized smart contracts platform, anchors the security of myriad smart contracts upon its own robustness. Its foundational peer-to-peer network facilitates a dependable node connection mechanism, whereas an efficient data-sharing protocol constitutes as the bedrock of Blockchain network security. In this paper, we propose NodeHunter, an Ethereum network detector implemented through the application of simulation technology, which is capable of aggregating all node records within the network and the interconnectedness between them. Utilizing this connection information, NodeHunter can procure more comprehensive insights for network status analysis compared to preceding detection methodologies. Throughout a three-month period of… More >

  • Open Access

    ARTICLE

    Monitoring Peer-to-Peer Botnets: Requirements, Challenges, and Future Works

    Arkan Hammoodi Hasan Kabla, Mohammed Anbar, Selvakumar Manickam, Alwan Ahmed Abdulrahman Alwan, Shankar Karuppayah*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3375-3398, 2023, DOI:10.32604/cmc.2023.036587

    Abstract The cyber-criminal compromises end-hosts (bots) to configure a network of bots (botnet). The cyber-criminals are also looking for an evolved architecture that makes their techniques more resilient and stealthier such as Peer-to-Peer (P2P) networks. The P2P botnets leverage the privileges of the decentralized nature of P2P networks. Consequently, the P2P botnets exploit the resilience of this architecture to be arduous against take-down procedures. Some P2P botnets are smarter to be stealthy in their Command-and-Control mechanisms (C2) and elude the standard discovery mechanisms. Therefore, the other side of this cyberwar is the monitor. The P2P botnet monitoring is an exacting mission… More >

  • Open Access

    ARTICLE

    Peer-to-Peer Energy Trading Method of Multi-Virtual Power Plants Based on Non-Cooperative Game

    Jingjing Bai*, Hongyi Zhou, Zheng Xu, Yu Zhong

    Energy Engineering, Vol.120, No.5, pp. 1163-1183, 2023, DOI:10.32604/ee.2023.025553

    Abstract The current electricity market fails to consider the energy consumption characteristics of transaction subjects such as virtual power plants. Besides, the game relationship between transaction subjects needs to be further explored. This paper proposes a Peer-to-Peer energy trading method for multi-virtual power plants based on a non-cooperative game. Firstly, a coordinated control model of public buildings is incorporated into the scheduling framework of the virtual power plant, considering the energy consumption characteristics of users. Secondly, the utility functions of multiple virtual power plants are analyzed, and a non-cooperative game model is established to explore the game relationship between electricity sellers… More >

  • Open Access

    ARTICLE

    Integrated Privacy Preserving Healthcare System Using Posture-Based Classifier in Cloud

    C. Santhosh Kumar1, K. Vishnu Kumar2,*

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 2893-2907, 2023, DOI:10.32604/iasc.2023.029669

    Abstract Privacy-preserving online disease prediction and diagnosis are critical issues in the emerging edge-cloud-based healthcare system. Online patient data processing from remote places may lead to severe privacy problems. Moreover, the existing cloud-based healthcare system takes more latency and energy consumption during diagnosis due to offloading of live patient data to remote cloud servers. Solve the privacy problem. The proposed research introduces the edge-cloud enabled privacy-preserving healthcare system by exploiting additive homomorphic encryption schemes. It can help maintain the privacy preservation and confidentiality of patients’ medical data during diagnosis of Parkinson’s disease. In addition, the energy and delay aware computational offloading… More >

  • Open Access

    ARTICLE

    Windows 10's Browser Forensic Analysis for Tracing P2P Networks’ Anonymous Attacks

    Saima Kauser1, Tauqeer Safdar Malik1,*, Mohd Hilmi Hasan2, Emelia Akashah P. Akhir2, Syed Muhammad Husnain Kazmi3

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1251-1273, 2022, DOI:10.32604/cmc.2022.022475

    Abstract A web browser is the most basic tool for accessing the internet from any of the machines/equipment. Recently, data breaches have been reported frequently from users who are concerned about their personal information, as well as threats from criminal actors. Giving loss of data and information to an innocent user comes under the jurisdiction of cyber-attack. These kinds of cyber-attacks are far more dangerous when it comes to the many types of devices employed in an internet of things (IoT) environment. Continuous surveillance of IoT devices and forensic tools are required to overcome the issues pertaining to secure data and… More >

  • Open Access

    ARTICLE

    Deep Learning Enabled Predictive Model for P2P Energy Trading in TEM

    Pudi Sekhar1, T. J. Benedict Jose2, Velmurugan Subbiah Parvathy3, E. Laxmi Lydia4, Seifedine Kadry5, Kuntha Pin6, Yunyoung Nam7,*

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1473-1487, 2022, DOI:10.32604/cmc.2022.022110

    Abstract With the incorporation of distributed energy systems in the electric grid, transactive energy market (TEM) has become popular in balancing the demand as well as supply adaptively over the grid. The classical grid can be updated to the smart grid by the integration of Information and Communication Technology (ICT) over the grids. The TEM allows the Peer-to-Peer (P2P) energy trading in the grid that effectually connects the consumer and prosumer to trade energy among them. At the same time, there is a need to predict the load for effectual P2P energy trading and can be accomplished by the use of… More >

  • Open Access

    ARTICLE

    Optimal Load Forecasting Model for Peer-to-Peer Energy Trading in Smart Grids

    Lijo Jacob Varghese1, K. Dhayalini2, Suma Sira Jacob3, Ihsan Ali4,*, Abdelzahir Abdelmaboud5, Taiseer Abdalla Elfadil Eisa6

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1053-1067, 2022, DOI:10.32604/cmc.2022.019435

    Abstract Peer-to-Peer (P2P) electricity trading is a significant research area that offers maximum fulfilment for both prosumer and consumer. It also decreases the quantity of line loss incurred in Smart Grid (SG). But, uncertainities in demand and supply of the electricity might lead to instability in P2P market for both prosumer and consumer. In recent times, numerous Machine Learning (ML)-enabled load predictive techniques have been developed, while most of the existing studies did not consider its implicit features, optimal parameter selection, and prediction stability. In order to overcome fulfill this research gap, the current research paper presents a new Multi-Objective Grasshopper… More >

  • Open Access

    ARTICLE

    Mathematical Model Validation of Search Protocols in MP2P Networks

    Ajay Arunachalam1,*, Vinayakumar Ravi2, Moez Krichen3, Roobaea Alroobaea4, Saeed Rubaiee5

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1807-1829, 2021, DOI:10.32604/cmc.2021.016692

    Abstract Broadcasting is a basic technique in Mobile ad-hoc network (MANET), and it refers to sending a packet from one node to every other node within the transmission range. Flooding is a type of broadcast where the received packet is retransmitted once by every node. The naive flooding technique, floods the network with query messages, while the random walk technique operates by contacting the subsets of every node’s neighbors at each step, thereby restricting the search space. One of the key challenges in an ad-hoc network is the resource or content discovery problem which is about locating the queried resource. Many… More >

  • Open Access

    ARTICLE

    Analytical Comparison of Resource Search Algorithms in Non-DHT Mobile Peer-to-Peer Networks

    Ajay Arunachalam1,*, Vinayakumar Ravi2, Moez Krichen3, Roobaea Alroobaea4, Jehad Saad Alqurni5

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 983-1001, 2021, DOI:10.32604/cmc.2021.015371

    Abstract One of the key challenges in ad-hoc networks is the resource discovery problem. How efficiently & quickly the queried resource/object can be resolved in such a highly dynamic self-evolving network is the underlying question? Broadcasting is a basic technique in the Mobile Ad-hoc Networks (MANETs), and it refers to sending a packet from one node to every other node within the transmission range. Flooding is a type of broadcast where the received packet is retransmitted once by every node. The naive flooding technique floods the network with query messages, while the random walk scheme operates by contacting subsets of each… More >

Displaying 1-10 on page 1 of 13. Per Page