Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (47)
  • Open Access

    ARTICLE

    Research on Data Tampering Prevention Method for ATC Network Based on Zero Trust

    Xiaoyan Zhu1, Ruchun Jia2, Tingrui Zhang3, Song Yao4,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4363-4377, 2024, DOI:10.32604/cmc.2023.045615

    Abstract The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect, which is easy to leads to the problem that the data is usurped. Starting from the application of the ATC (automatic train control) network, this paper focuses on the zero trust and zero trust access strategy and the tamper-proof method of information-sharing network data. Through the improvement of ATC’s zero trust physical layer authentication and network data distributed feature differentiation calculation, this paper reconstructs the personal privacy scope authentication structure and designs a tamper-proof method of ATC’s information sharing on the… More >

  • Open Access

    ARTICLE

    Advanced Optimized Anomaly Detection System for IoT Cyberattacks Using Artificial Intelligence

    Ali Hamid Farea1,*, Omar H. Alhazmi1, Kerem Kucuk2

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1525-1545, 2024, DOI:10.32604/cmc.2023.045794

    Abstract While emerging technologies such as the Internet of Things (IoT) have many benefits, they also pose considerable security challenges that require innovative solutions, including those based on artificial intelligence (AI), given that these techniques are increasingly being used by malicious actors to compromise IoT systems. Although an ample body of research focusing on conventional AI methods exists, there is a paucity of studies related to advanced statistical and optimization approaches aimed at enhancing security measures. To contribute to this nascent research stream, a novel AI-driven security system denoted as “AI2AI” is presented in this work. AI2AI employs AI techniques to… More >

  • Open Access

    ARTICLE

    Intrusion Detection and Prevention Model for Blockchain Based IoMT Applications

    Jameel Almalki*

    Computer Systems Science and Engineering, Vol.48, No.1, pp. 131-152, 2024, DOI:10.32604/csse.2023.038085

    Abstract The recent global pandemic has resulted in growth in the medical and healthcare sectors. Applications used in these domains have become more advanced and digitally integrated. Sensor-based Internet of Things (IoT) devices are increasing in healthcare and medical units. The emerging trend with the use of IoT devices in medical healthcare is termed as Internet of Medical Things (IoMT). The instruments used in these healthcare units comprise various sensors that can record patient body observations. These recorded observations are streamed across Internet-based channels to be stored and analyzed in centralized servers. Patient diagnostics are performed based on the information retrieved… More >

  • Open Access

    ARTICLE

    A Fully Adaptive Active Queue Management Method for Congestion Prevention at the Router Buffer

    Ali Alshahrani1, Ahmad Adel Abu-Shareha2,*, Qusai Y. Shambour2, Basil Al-Kasasbeh1

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1679-1698, 2023, DOI:10.32604/cmc.2023.043545

    Abstract Active queue management (AQM) methods manage the queued packets at the router buffer, prevent buffer congestion, and stabilize the network performance. The bursty nature of the traffic passing by the network routers and the slake behavior of the existing AQM methods leads to unnecessary packet dropping. This paper proposes a fully adaptive active queue management (AAQM) method to maintain stable network performance, avoid congestion and packet loss, and eliminate unnecessary packet dropping. The proposed AAQM method is based on load and queue length indicators and uses an adaptive mechanism to adjust the dropping probability based on the buffer status. The… More >

  • Open Access

    ARTICLE

    A Machine Learning-Based Attack Detection and Prevention System in Vehicular Named Data Networking

    Arif Hussain Magsi1,*, Ali Ghulam2, Saifullah Memon1, Khalid Javeed3, Musaed Alhussein4, Imad Rida5

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1445-1465, 2023, DOI:10.32604/cmc.2023.040290

    Abstract Named Data Networking (NDN) is gaining a significant attention in Vehicular Ad-hoc Networks (VANET) due to its in-network content caching, name-based routing, and mobility-supporting characteristics. Nevertheless, existing NDN faces three significant challenges, including security, privacy, and routing. In particular, security attacks, such as Content Poisoning Attacks (CPA), can jeopardize legitimate vehicles with malicious content. For instance, attacker host vehicles can serve consumers with invalid information, which has dire consequences, including road accidents. In such a situation, trust in the content-providing vehicles brings a new challenge. On the other hand, ensuring privacy and preventing unauthorized access in vehicular (VNDN) is another… More >

  • Open Access

    ARTICLE

    Paradigm of Numerical Simulation of Spatial Wind Field for Disaster Prevention of Transmission Tower Lines

    Yongxin Liu1, Puyu Zhao2, Jianxin Xu2, Xiaokai Meng1, Hong Yang1, Bo He2,*

    Structural Durability & Health Monitoring, Vol.17, No.6, pp. 521-539, 2023, DOI:10.32604/sdhm.2023.029850

    Abstract Numerical simulation of the spatial wind field plays a very important role in the study of wind-induced response law of transmission tower structures. A reasonable construction of a numerical simulation method of the wind field is conducive to the study of wind-induced response law under the action of an actual wind field. Currently, many research studies rely on simulating spatial wind fields as Gaussian wind, often overlooking the basic non-Gaussian characteristics. This paper aims to provide a comprehensive overview of the historical development and current state of spatial wind field simulations, along with a detailed introduction to standard simulation methods.… More > Graphic Abstract

    Paradigm of Numerical Simulation of Spatial Wind Field for Disaster Prevention of Transmission Tower Lines

  • Open Access

    ARTICLE

    Effect of Bio-Based Organic‒Inorganic Hybrid Hydrogels on Fire Prevention of Spontaneous Combustion of Coals

    Hu Shi, Wei Cai, Xin Wang*, Lei Song, Yuan Hu*

    Journal of Renewable Materials, Vol.11, No.12, pp. 3991-4006, 2023, DOI:10.32604/jrm.2023.029888

    Abstract To solve the fire accidents caused by coal combustion, this work prepared four hybrid hydrogel materials using bio-based polymers, flame retardants, and inorganic materials. Compared to pure water and 3.5 wt% MgCl2 solution, the as-prepared hydrogel presents good fire prevention performance. In addition, it is found that CO and CO2 are not produced by coal when the pyrolysis temperature is lower than 200°C. During low-temperature pyrolysis, CO is more likely to be produced than CO2, indicating inadequate pyrolysis behavior. At the same time, the addition of fire-preventing hydrogel can not only decrease the maximum CO2 concentration before the critical temperature… More > Graphic Abstract

    Effect of Bio-Based Organic‒Inorganic Hybrid Hydrogels on Fire Prevention of Spontaneous Combustion of Coals

  • Open Access

    ARTICLE

    Collaborative Detection and Prevention of Sybil Attacks against RPL-Based Internet of Things

    Muhammad Ali Khan1, Rao Naveed Bin Rais2,*, Osman Khalid1

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 827-843, 2023, DOI:10.32604/cmc.2023.040756

    Abstract The Internet of Things (IoT) comprises numerous resource-constrained devices that generate large volumes of data. The inherent vulnerabilities in IoT infrastructure, such as easily spoofed IP and MAC addresses, pose significant security challenges. Traditional routing protocols designed for wired or wireless networks may not be suitable for IoT networks due to their limitations. Therefore, the Routing Protocol for Low-Power and Lossy Networks (RPL) is widely used in IoT systems. However, the built-in security mechanism of RPL is inadequate in defending against sophisticated routing attacks, including Sybil attacks. To address these issues, this paper proposes a centralized and collaborative approach for… More >

  • Open Access

    ARTICLE

    Deep Facial Emotion Recognition Using Local Features Based on Facial Landmarks for Security System

    Youngeun An, Jimin Lee, EunSang Bak*, Sungbum Pan*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1817-1832, 2023, DOI:10.32604/cmc.2023.039460

    Abstract Emotion recognition based on facial expressions is one of the most critical elements of human-machine interfaces. Most conventional methods for emotion recognition using facial expressions use the entire facial image to extract features and then recognize specific emotions through a pre-trained model. In contrast, this paper proposes a novel feature vector extraction method using the Euclidean distance between the landmarks changing their positions according to facial expressions, especially around the eyes, eyebrows, nose, and mouth. Then, we apply a new classifier using an ensemble network to increase emotion recognition accuracy. The emotion recognition performance was compared with the conventional algorithms… More >

  • Open Access

    ARTICLE

    Parents of Children Suffering from Cancer or in Remission from Cancer: a Need to Accompany Them!

    Parents d’un enfant atteint de cancer ou en rémission de cancer : une nécessité de les accompagner !

    M. Vander Haegen, C. Flahault, K. Lamore

    Psycho-Oncologie, Vol.16, No.4, pp. 339-341, 2022, DOI:10.3166/pson-2022-0215

    Abstract When cancer strikes a child, parents (and family) find themselves involved at many levels in the trajectory of the disease and treatment. This trajectory of care varies from family to family. For several years, the psycho-medical world has been implementing actions in the field to support parents of a child with cancer or in remission from cancer. As health professionals, we must continue these actions and develop a strong and harmonious partnership with parents because they are the first relays for the medical care of the child.

    Résumé Lorsqu’un cancer touche un enfant, les parents (et la famille) se retrouvent… More >

Displaying 1-10 on page 1 of 47. Per Page