Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (57)
  • Open Access

    ARTICLE

    Enhanced Deep Reinforcement Learning Strategy for Energy Management in Plug-in Hybrid Electric Vehicles with Entropy Regularization and Prioritized Experience Replay

    Li Wang1,*, Xiaoyong Wang2

    Energy Engineering, Vol.121, No.12, pp. 3953-3979, 2024, DOI:10.32604/ee.2024.056705 - 22 November 2024

    Abstract Plug-in Hybrid Electric Vehicles (PHEVs) represent an innovative breed of transportation, harnessing diverse power sources for enhanced performance. Energy management strategies (EMSs) that coordinate and control different energy sources is a critical component of PHEV control technology, directly impacting overall vehicle performance. This study proposes an improved deep reinforcement learning (DRL)-based EMS that optimizes real-time energy allocation and coordinates the operation of multiple power sources. Conventional DRL algorithms struggle to effectively explore all possible state-action combinations within high-dimensional state and action spaces. They often fail to strike an optimal balance between exploration and exploitation, and… More >

  • Open Access

    ARTICLE

    Two-Stage Client Selection Scheme for Blockchain-Enabled Federated Learning in IoT

    Xiaojun Jin1, Chao Ma2,*, Song Luo2, Pengyi Zeng1, Yifei Wei1

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2317-2336, 2024, DOI:10.32604/cmc.2024.055344 - 18 November 2024

    Abstract Federated learning enables data owners in the Internet of Things (IoT) to collaborate in training models without sharing private data, creating new business opportunities for building a data market. However, in practical operation, there are still some problems with federated learning applications. Blockchain has the characteristics of decentralization, distribution, and security. The blockchain-enabled federated learning further improve the security and performance of model training, while also expanding the application scope of federated learning. Blockchain has natural financial attributes that help establish a federated learning data market. However, the data of federated learning tasks may be… More >

  • Open Access

    ARTICLE

    Reversible Data Hiding Algorithm in Encrypted Images Based on Adaptive Median Edge Detection and Ciphertext-Policy Attribute-Based Encryption

    Zongbao Jiang, Minqing Zhang*, Weina Dong, Chao Jiang, Fuqiang Di

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1123-1155, 2024, DOI:10.32604/cmc.2024.055120 - 15 October 2024

    Abstract With the rapid advancement of cloud computing technology, reversible data hiding algorithms in encrypted images (RDH-EI) have developed into an important field of study concentrated on safeguarding privacy in distributed cloud environments. However, existing algorithms often suffer from low embedding capacities and are inadequate for complex data access scenarios. To address these challenges, this paper proposes a novel reversible data hiding algorithm in encrypted images based on adaptive median edge detection (AMED) and ciphertext-policy attribute-based encryption (CP-ABE). This proposed algorithm enhances the conventional median edge detection (MED) by incorporating dynamic variables to improve pixel prediction… More >

  • Open Access

    ARTICLE

    Adaptable and Dynamic Access Control Decision-Enforcement Approach Based on Multilayer Hybrid Deep Learning Techniques in BYOD Environment

    Aljuaid Turkea Ayedh M1,2,*, Ainuddin Wahid Abdul Wahab1,*, Mohd Yamani Idna Idris1,3

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4663-4686, 2024, DOI:10.32604/cmc.2024.055287 - 12 September 2024

    Abstract Organizations are adopting the Bring Your Own Device (BYOD) concept to enhance productivity and reduce expenses. However, this trend introduces security challenges, such as unauthorized access. Traditional access control systems, such as Attribute-Based Access Control (ABAC) and Role-Based Access Control (RBAC), are limited in their ability to enforce access decisions due to the variability and dynamism of attributes related to users and resources. This paper proposes a method for enforcing access decisions that is adaptable and dynamic, based on multilayer hybrid deep learning techniques, particularly the Tabular Deep Neural Network TabularDNN method. This technique transforms… More >

  • Open Access

    ARTICLE

    Automatic Generation of Attribute-Based Access Control Policies from Natural Language Documents

    Fangfang Shan1,2,*, Zhenyu Wang1,2, Mengyao Liu1,2, Menghan Zhang1,2

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3881-3902, 2024, DOI:10.32604/cmc.2024.055167 - 12 September 2024

    Abstract In response to the challenges of generating Attribute-Based Access Control (ABAC) policies, this paper proposes a deep learning-based method to automatically generate ABAC policies from natural language documents. This method is aimed at organizations such as companies and schools that are transitioning from traditional access control models to the ABAC model. The manual retrieval and analysis involved in this transition are inefficient, prone to errors, and costly. Most organizations have high-level specifications defined for security policies that include a set of access control policies, which often exist in the form of natural language documents. Utilizing… More >

  • Open Access

    ARTICLE

    Cross-Domain Bilateral Access Control on Blockchain-Cloud Based Data Trading System

    Youngho Park1, Su Jin Shin2, Sang Uk Shin3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 671-688, 2024, DOI:10.32604/cmes.2024.052378 - 20 August 2024

    Abstract Data trading enables data owners and data requesters to sell and purchase data. With the emergence of blockchain technology, research on blockchain-based data trading systems is receiving a lot of attention. Particularly, to reduce the on-chain storage cost, a novel paradigm of blockchain and cloud fusion has been widely considered as a promising data trading platform. Moreover, the fact that data can be used for commercial purposes will encourage users and organizations from various fields to participate in the data marketplace. In the data marketplace, it is a challenge how to trade the data securely… More >

  • Open Access

    ARTICLE

    Federated Network Intelligence Orchestration for Scalable and Automated FL-Based Anomaly Detection in B5G Networks

    Pablo Fernández Saura1,*, José M. Bernabé Murcia1, Emilio García de la Calera Molina1, Alejandro Molina Zarca2, Jorge Bernal Bernabé1, Antonio F. Skarmeta Gómez1

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 163-193, 2024, DOI:10.32604/cmc.2024.051307 - 18 July 2024

    Abstract The management of network intelligence in Beyond 5G (B5G) networks encompasses the complex challenges of scalability, dynamicity, interoperability, privacy, and security. These are essential steps towards achieving the realization of truly ubiquitous Artificial Intelligence (AI)-based analytics, empowering seamless integration across the entire Continuum (Edge, Fog, Core, Cloud). This paper introduces a Federated Network Intelligence Orchestration approach aimed at scalable and automated Federated Learning (FL)-based anomaly detection in B5G networks. By leveraging a horizontal Federated learning approach based on the FedAvg aggregation algorithm, which employs a deep autoencoder model trained on non-anomalous traffic samples to recognize… More >

  • Open Access

    ARTICLE

    Exploring the Prevalence and Contributing Factors of Depression among Sickle Cell Anemia Patients in Saudi Arabia’s Jazan Region

    Abdullah A. Alharbi1, Ahmad Y. Alqassim1,*, Mohammed A. Muaddi1, Najat H. Aldubayyan1, Rana I. Abuhadi1, Futon A. Akoor1, Sarah J. Mobarki1, Imtenan A. Oberi1, Ghaidaa H. Alharbi1, Yara Ajeebi1, Adnan M. Alkhayat2, Hafiz Malhan3, Mohammed Bakkar4, Anwar M. Makeen1

    International Journal of Mental Health Promotion, Vol.26, No.5, pp. 351-359, 2024, DOI:10.32604/ijmhp.2024.047219 - 30 May 2024

    Abstract Sickle Cell Anemia (SCA) is a prevalent genetic condition in Saudi Arabia, particularly in the Jazan region. The study’s purpose was to assess the prevalence of de-pression among individuals with SCA in this area and to identify the factors associated with this condition. The study involved 391 adult participants, all patients in the hematology center of Prince Mohammed bin Nasser Hospital (PMNH). Data was collected through an anonymous interview questionnaire–the Arabic version of the Patient Health Questionnaire-9 (PHQ-9)–between March–May 2022. The questionnaire covered socio-demographic information and variables related to the participant’s SCA history, such as… More >

  • Open Access

    EDITORIAL

    Health Systems Strengthening to Tackle the Global Burden of Pediatric and Congenital Heart Disease: A Diagonal Approach

    Dominique Vervoort1,2,3,*, Amy Verstappen3, Sreehari Madhavankutty Nair4, Chong Chin Eu5, Bistra Zheleva3,6

    Congenital Heart Disease, Vol.19, No.2, pp. 131-138, 2024, DOI:10.32604/chd.2024.049814 - 16 May 2024

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    Enhancing Cybersecurity Competency in the Kingdom of Saudi Arabia: A Fuzzy Decision-Making Approach

    Wajdi Alhakami*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3211-3237, 2024, DOI:10.32604/cmc.2023.043935 - 15 May 2024

    Abstract The Kingdom of Saudi Arabia (KSA) has achieved significant milestones in cybersecurity. KSA has maintained solid regulatory mechanisms to prevent, trace, and punish offenders to protect the interests of both individual users and organizations from the online threats of data poaching and pilferage. The widespread usage of Information Technology (IT) and IT Enable Services (ITES) reinforces security measures. The constantly evolving cyber threats are a topic that is generating a lot of discussion. In this league, the present article enlists a broad perspective on how cybercrime is developing in KSA at present and also takes… More >

Displaying 1-10 on page 1 of 57. Per Page