Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (51)
  • Open Access

    ARTICLE

    Federated Network Intelligence Orchestration for Scalable and Automated FL-Based Anomaly Detection in B5G Networks

    Pablo Fernández Saura1,*, José M. Bernabé Murcia1, Emilio García de la Calera Molina1, Alejandro Molina Zarca2, Jorge Bernal Bernabé1, Antonio F. Skarmeta Gómez1

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 163-193, 2024, DOI:10.32604/cmc.2024.051307

    Abstract The management of network intelligence in Beyond 5G (B5G) networks encompasses the complex challenges of scalability, dynamicity, interoperability, privacy, and security. These are essential steps towards achieving the realization of truly ubiquitous Artificial Intelligence (AI)-based analytics, empowering seamless integration across the entire Continuum (Edge, Fog, Core, Cloud). This paper introduces a Federated Network Intelligence Orchestration approach aimed at scalable and automated Federated Learning (FL)-based anomaly detection in B5G networks. By leveraging a horizontal Federated learning approach based on the FedAvg aggregation algorithm, which employs a deep autoencoder model trained on non-anomalous traffic samples to recognize… More >

  • Open Access

    ARTICLE

    Exploring the Prevalence and Contributing Factors of Depression among Sickle Cell Anemia Patients in Saudi Arabia’s Jazan Region

    Abdullah A. Alharbi1, Ahmad Y. Alqassim1,*, Mohammed A. Muaddi1, Najat H. Aldubayyan1, Rana I. Abuhadi1, Futon A. Akoor1, Sarah J. Mobarki1, Imtenan A. Oberi1, Ghaidaa H. Alharbi1, Yara Ajeebi1, Adnan M. Alkhayat2, Hafiz Malhan3, Mohammed Bakkar4, Anwar M. Makeen1

    International Journal of Mental Health Promotion, Vol.26, No.5, pp. 351-359, 2024, DOI:10.32604/ijmhp.2024.047219

    Abstract Sickle Cell Anemia (SCA) is a prevalent genetic condition in Saudi Arabia, particularly in the Jazan region. The study’s purpose was to assess the prevalence of de-pression among individuals with SCA in this area and to identify the factors associated with this condition. The study involved 391 adult participants, all patients in the hematology center of Prince Mohammed bin Nasser Hospital (PMNH). Data was collected through an anonymous interview questionnaire–the Arabic version of the Patient Health Questionnaire-9 (PHQ-9)–between March–May 2022. The questionnaire covered socio-demographic information and variables related to the participant’s SCA history, such as… More >

  • Open Access

    EDITORIAL

    Health Systems Strengthening to Tackle the Global Burden of Pediatric and Congenital Heart Disease: A Diagonal Approach

    Dominique Vervoort1,2,3,*, Amy Verstappen3, Sreehari Madhavankutty Nair4, Chong Chin Eu5, Bistra Zheleva3,6

    Congenital Heart Disease, Vol.19, No.2, pp. 131-138, 2024, DOI:10.32604/chd.2024.049814

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    Enhancing Cybersecurity Competency in the Kingdom of Saudi Arabia: A Fuzzy Decision-Making Approach

    Wajdi Alhakami*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3211-3237, 2024, DOI:10.32604/cmc.2023.043935

    Abstract The Kingdom of Saudi Arabia (KSA) has achieved significant milestones in cybersecurity. KSA has maintained solid regulatory mechanisms to prevent, trace, and punish offenders to protect the interests of both individual users and organizations from the online threats of data poaching and pilferage. The widespread usage of Information Technology (IT) and IT Enable Services (ITES) reinforces security measures. The constantly evolving cyber threats are a topic that is generating a lot of discussion. In this league, the present article enlists a broad perspective on how cybercrime is developing in KSA at present and also takes… More >

  • Open Access

    ARTICLE

    Perception Enhanced Deep Deterministic Policy Gradient for Autonomous Driving in Complex Scenarios

    Lyuchao Liao1,2, Hankun Xiao2,*, Pengqi Xing2, Zhenhua Gan1,2, Youpeng He2, Jiajun Wang2

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 557-576, 2024, DOI:10.32604/cmes.2024.047452

    Abstract Autonomous driving has witnessed rapid advancement; however, ensuring safe and efficient driving in intricate scenarios remains a critical challenge. In particular, traffic roundabouts bring a set of challenges to autonomous driving due to the unpredictable entry and exit of vehicles, susceptibility to traffic flow bottlenecks, and imperfect data in perceiving environmental information, rendering them a vital issue in the practical application of autonomous driving. To address the traffic challenges, this work focused on complex roundabouts with multi-lane and proposed a Perception Enhanced Deep Deterministic Policy Gradient (PE-DDPG) for Autonomous Driving in the Roundabouts. Specifically, the… More >

  • Open Access

    ARTICLE

    Research on Data Tampering Prevention Method for ATC Network Based on Zero Trust

    Xiaoyan Zhu1, Ruchun Jia2, Tingrui Zhang3, Song Yao4,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4363-4377, 2024, DOI:10.32604/cmc.2023.045615

    Abstract The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect, which is easy to leads to the problem that the data is usurped. Starting from the application of the ATC (automatic train control) network, this paper focuses on the zero trust and zero trust access strategy and the tamper-proof method of information-sharing network data. Through the improvement of ATC’s zero trust physical layer authentication and network data distributed feature differentiation calculation, this paper reconstructs the personal privacy scope authentication structure and designs a tamper-proof method of… More >

  • Open Access

    REVIEW

    Nigerian Biomass for Bioenergy Applications: A Review on the Potential and Challenges

    Adekunle A. Adeleke1,*, Nzerem Petrus2, Salihu Ayuba2, Asmau M. Yahya2, Peter P. Ikubanni3, Ikechuckwu S. Okafor2, Stephen S. Emmanuel4, Adebayo I. Olosho4, Ademidun A. Adesibikan4

    Journal of Renewable Materials, Vol.11, No.12, pp. 4123-4141, 2023, DOI:10.32604/jrm.2023.043915

    Abstract Nigeria, often referred to as “the giant of Africa,” boasts a sizable population, a thriving economy, and abundant energy resources. Nevertheless, Nigeria has yet to fully harness its renewable energy potential, despite its enormous capacity in this field. The goal of this review paper is to thoroughly examine the difficulties and untapped opportunities in utilizing biomass for bioenergy production in Nigeria. Notably, Nigeria generates substantial volumes of biomass annually, primarily in the form of agricultural waste, which is often either discarded or burned inefficiently, resulting in significant ecological and environmental damage. Therefore, an efficient approach… More > Graphic Abstract

    Nigerian Biomass for Bioenergy Applications: A Review on the Potential and Challenges

  • Open Access

    ARTICLE

    NPBMT: A Novel and Proficient Buffer Management Technique for Internet of Vehicle-Based DTNs

    Sikandar Khan1, Khalid Saeed1, Muhammad Faran Majeed2,*, Salman A. AlQahtani3, Khursheed Aurangzeb3, Muhammad Shahid Anwar4,*

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 1303-1323, 2023, DOI:10.32604/cmc.2023.039697

    Abstract Delay Tolerant Networks (DTNs) have the major problem of message delay in the network due to a lack of end-to-end connectivity between the nodes, especially when the nodes are mobile. The nodes in DTNs have limited buffer storage for storing delayed messages. This instantaneous sharing of data creates a low buffer/shortage problem. Consequently, buffer congestion would occur and there would be no more space available in the buffer for the upcoming messages. To address this problem a buffer management policy is proposed named “A Novel and Proficient Buffer Management Technique (NPBMT) for the Internet of… More >

  • Open Access

    ARTICLE

    Blockchain-Based Secure and Fair IoT Data Trading System with Bilateral Authorization

    Youngho Park1, Mi Hyeon Jeon2, Sang Uk Shin3,*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1871-1890, 2023, DOI:10.32604/cmc.2023.039462

    Abstract These days, data is regarded as a valuable asset in the era of the data economy, which demands a trading platform for buying and selling data. However, online data trading poses challenges in terms of security and fairness because the seller and the buyer may not fully trust each other. Therefore, in this paper, a blockchain-based secure and fair data trading system is proposed by taking advantage of the smart contract and matchmaking encryption. The proposed system enables bilateral authorization, where data trading between a seller and a buyer is accomplished only if their policies,… More >

  • Open Access

    ARTICLE

    Hidden Hierarchy Based on Cipher-Text Attribute Encryption for IoT Data Privacy in Cloud

    Zaid Abdulsalam Ibrahim1,*, Muhammad Ilyas2

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 939-956, 2023, DOI:10.32604/cmc.2023.035798

    Abstract Most research works nowadays deal with real-time Internet of Things (IoT) data. However, with exponential data volume increases, organizations need help storing such humongous amounts of IoT data in cloud storage systems. Moreover, such systems create security issues while efficiently using IoT and Cloud Computing technologies. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has the potential to make IoT data more secure and reliable in various cloud storage services. Cloud-assisted IoTs suffer from two privacy issues: access policies (public) and super polynomial decryption times (attributed mainly to complex access structures). We have developed a CP-ABE scheme in alignment… More >

Displaying 1-10 on page 1 of 51. Per Page