Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22)
  • Open Access

    ARTICLE

    Sports Events Recognition Using Multi Features and Deep Belief Network

    Bayan Alabdullah1, Muhammad Tayyab2, Yahay AlQahtani3, Naif Al Mudawi4, Asaad Algarni5, Ahmad Jalal2, Jeongmin Park6,*

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 309-326, 2024, DOI:10.32604/cmc.2024.053538 - 15 October 2024

    Abstract In the modern era of a growing population, it is arduous for humans to monitor every aspect of sports, events occurring around us, and scenarios or conditions. This recognition of different types of sports and events has increasingly incorporated the use of machine learning and artificial intelligence. This research focuses on detecting and recognizing events in sequential photos characterized by several factors, including the size, location, and position of people’s body parts in those pictures, and the influence around those people. Common approaches utilized, here are feature descriptors such as MSER (Maximally Stable Extremal Regions),… More >

  • Open Access

    ARTICLE

    Designing a Secure and Scalable Data Sharing Mechanism Using Decentralized Identifiers (DID)

    Iuon-Chang Lin1, I-Ling Yeh1, Ching-Chun Chang2, Jui-Chuan Liu3, Chin-Chen Chang3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 809-822, 2024, DOI:10.32604/cmes.2024.051612 - 20 August 2024

    Abstract Centralized storage and identity identification methods pose many risks, including hacker attacks, data misuse, and single points of failure. Additionally, existing centralized identity management methods face interoperability issues and rely on a single identity provider, leaving users without control over their identities. Therefore, this paper proposes a mechanism for identity identification and data sharing based on decentralized identifiers. The scheme utilizes blockchain technology to store the identifiers and data hashed on the chain to ensure permanent identity recognition and data integrity. Data is stored on InterPlanetary File System (IPFS) to avoid the risk of single More >

  • Open Access

    ARTICLE

    Federated Network Intelligence Orchestration for Scalable and Automated FL-Based Anomaly Detection in B5G Networks

    Pablo Fernández Saura1,*, José M. Bernabé Murcia1, Emilio García de la Calera Molina1, Alejandro Molina Zarca2, Jorge Bernal Bernabé1, Antonio F. Skarmeta Gómez1

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 163-193, 2024, DOI:10.32604/cmc.2024.051307 - 18 July 2024

    Abstract The management of network intelligence in Beyond 5G (B5G) networks encompasses the complex challenges of scalability, dynamicity, interoperability, privacy, and security. These are essential steps towards achieving the realization of truly ubiquitous Artificial Intelligence (AI)-based analytics, empowering seamless integration across the entire Continuum (Edge, Fog, Core, Cloud). This paper introduces a Federated Network Intelligence Orchestration approach aimed at scalable and automated Federated Learning (FL)-based anomaly detection in B5G networks. By leveraging a horizontal Federated learning approach based on the FedAvg aggregation algorithm, which employs a deep autoencoder model trained on non-anomalous traffic samples to recognize… More >

  • Open Access

    ARTICLE

    Video Summarization Approach Based on Binary Robust Invariant Scalable Keypoints and Bisecting K-Means

    Sameh Zarif1,2,*, Eman Morad1, Khalid Amin1, Abdullah Alharbi3, Wail S. Elkilani4, Shouze Tang5

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3565-3583, 2024, DOI:10.32604/cmc.2024.046185 - 26 March 2024

    Abstract Due to the exponential growth of video data, aided by rapid advancements in multimedia technologies. It became difficult for the user to obtain information from a large video series. The process of providing an abstract of the entire video that includes the most representative frames is known as static video summarization. This method resulted in rapid exploration, indexing, and retrieval of massive video libraries. We propose a framework for static video summary based on a Binary Robust Invariant Scalable Keypoint (BRISK) and bisecting K-means clustering algorithm. The current method effectively recognizes relevant frames using BRISK… More >

  • Open Access

    ARTICLE

    A Novel 6G Scalable Blockchain Clustering-Based Computer Vision Character Detection for Mobile Images

    Yuejie Li1,2,*, Shijun Li3

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3041-3070, 2024, DOI:10.32604/cmc.2023.045741 - 26 March 2024

    Abstract 6G is envisioned as the next generation of wireless communication technology, promising unprecedented data speeds, ultra-low Latency, and ubiquitous Connectivity. In tandem with these advancements, blockchain technology is leveraged to enhance computer vision applications’ security, trustworthiness, and transparency. With the widespread use of mobile devices equipped with cameras, the ability to capture and recognize Chinese characters in natural scenes has become increasingly important. Blockchain can facilitate privacy-preserving mechanisms in applications where privacy is paramount, such as facial recognition or personal healthcare monitoring. Users can control their visual data and grant or revoke access as needed.… More >

  • Open Access

    REVIEW

    Blockchain-Enabled Cybersecurity Provision for Scalable Heterogeneous Network: A Comprehensive Survey

    Md. Shohidul Islam1,*, Md. Arafatur Rahman2, Mohamed Ariff Bin Ameedeen1, Husnul Ajra1, Zahian Binti Ismail1, Jasni Mohamad Zain3

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 43-123, 2024, DOI:10.32604/cmes.2023.028687 - 22 September 2023

    Abstract Blockchain-enabled cybersecurity system to ensure and strengthen decentralized digital transaction is gradually gaining popularity in the digital era for various areas like finance, transportation, healthcare, education, and supply chain management. Blockchain interactions in the heterogeneous network have fascinated more attention due to the authentication of their digital application exchanges. However, the exponential development of storage space capabilities across the blockchain-based heterogeneous network has become an important issue in preventing blockchain distribution and the extension of blockchain nodes. There is the biggest challenge of data integrity and scalability, including significant computing complexity and inapplicable latency on… More > Graphic Abstract

    Blockchain-Enabled Cybersecurity Provision for Scalable Heterogeneous Network: A Comprehensive Survey

  • Open Access

    ARTICLE

    A Scalable Interconnection Scheme in Many-Core Systems

    Allam Abumwais*, Mujahed Eleyat

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 615-632, 2023, DOI:10.32604/cmc.2023.038810 - 31 October 2023

    Abstract Recent architectures of multi-core systems may have a relatively large number of cores that typically ranges from tens to hundreds; therefore called many-core systems. Such systems require an efficient interconnection network that tries to address two major problems. First, the overhead of power and area cost and its effect on scalability. Second, high access latency is caused by multiple cores’ simultaneous accesses of the same shared module. This paper presents an interconnection scheme called N-conjugate Shuffle Clusters (NCSC) based on multi-core multi-cluster architecture to reduce the overhead of the just mentioned problems. NCSC eliminated the… More >

  • Open Access

    ARTICLE

    Edge of Things Inspired Robust Intrusion Detection Framework for Scalable and Decentralized Applications

    Abdulaziz Aldribi1,2,*, Aman Singh2,3, Jose Breñosa3,4

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3865-3881, 2023, DOI:10.32604/csse.2023.037748 - 03 April 2023

    Abstract Ubiquitous data monitoring and processing with minimal latency is one of the crucial challenges in real-time and scalable applications. Internet of Things (IoT), fog computing, edge computing, cloud computing, and the edge of things are the spine of all real-time and scalable applications. Conspicuously, this study proposed a novel framework for a real-time and scalable application that changes dynamically with time. In this study, IoT deployment is recommended for data acquisition. The Pre-Processing of data with local edge and fog nodes is implemented in this study. The threshold-oriented data classification method is deployed to improve… More >

  • Open Access

    ARTICLE

    Scalable Blockchain Technology for Tracking the Provenance of the Agri-Food

    B. Subashini*, D. Hemavathi

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3339-3358, 2023, DOI:10.32604/cmc.2023.035074 - 31 March 2023

    Abstract Due to an increase in agricultural mislabeling and carelesshandling of non-perishable foods in recent years, consumers have been calling for the food sector to be more transparent. Due to information dispersion between divisions and the propensity to record inaccurate data, current traceability solutions typically fail to provide reliable farm-to-fork histories ofproducts. The three most enticing characteristics of blockchain technology areopenness, integrity, and traceability, which make it a potentially crucial tool for guaranteeing the integrity and correctness of data. In this paper, we suggest a permissioned blockchain system run by organizations, such as regulatory bodies, to… More >

  • Open Access

    ARTICLE

    Ether-IoT: A Realtime Lightweight and Scalable Blockchain-Enabled Cache Algorithm for IoT Access Control

    Hafiz Adnan Hussain*, Zulkefli Mansor, Zarina Shukur, Uzma Jafar

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3797-3815, 2023, DOI:10.32604/cmc.2023.034671 - 31 March 2023

    Abstract Several unique characteristics of Internet of Things (IoT) devices, such as distributed deployment and limited storage, make it challenging for standard centralized access control systems to enable access control in today’s large-scale IoT ecosystem. To solve these challenges, this study presents an IoT access control system called Ether-IoT based on the Ethereum Blockchain (BC) infrastructure with Attribute-Based Access Control (ABAC). Access Contract (AC), Cache Contract (CC), Device Contract (DC), and Policy Contract (PC) are the four central smart contracts (SCs) that are included in the proposed system. CC offers a way to save user characteristics… More >

Displaying 1-10 on page 1 of 22. Per Page