Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (37)
  • Open Access

    ARTICLE

    Secure and Efficient Data Transmission Scheme Based on Physical Mechanism

    Ping Zhang1, Haoran Zhu1, Wenjun Li2, Osama Alfarraj3, Amr Tolba3, Gwang-jun Kim4,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3589-3605, 2023, DOI:10.32604/cmc.2023.032097 - 31 March 2023

    Abstract Many Internet of things application scenarios have the characteristics of limited hardware resources and limited energy supply, which are not suitable for traditional security technology. The security technology based on the physical mechanism has attracted extensive attention. How to improve the key generation rate has always been one of the urgent problems to be solved in the security technology based on the physical mechanism. In this paper, superlattice technology is introduced to the security field of Internet of things, and a high-speed symmetric key generation scheme based on superlattice for Internet of things is proposed. More >

  • Open Access

    ARTICLE

    Secured Framework for Assessment of Chronic Kidney Disease in Diabetic Patients

    Sultan Mesfer Aldossary*

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3387-3404, 2023, DOI:10.32604/iasc.2023.035249 - 15 March 2023

    Abstract With the emergence of cloud technologies, the services of healthcare systems have grown. Simultaneously, machine learning systems have become important tools for developing matured and decision-making computer applications. Both cloud computing and machine learning technologies have contributed significantly to the success of healthcare services. However, in some areas, these technologies are needed to provide and decide the next course of action for patients suffering from diabetic kidney disease (DKD) while ensuring privacy preservation of the medical data. To address the cloud data privacy problem, we proposed a DKD prediction module in a framework using cloud… More >

  • Open Access

    ARTICLE

    Comparative Analysis of Execution of CNN-Based Sanguine Data Transmission with LSB-SS and PVD-SS

    Alaknanda S. Patil1,*, G. Sundari1, Arun Kumar Sivaraman2

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1707-1721, 2023, DOI:10.32604/csse.2023.034270 - 09 February 2023

    Abstract The intact data transmission to the authentic user is becoming crucial at every moment in the current era. Steganography; is a technique for concealing the hidden message in any cover media such as image, video; and audio to increase the protection of data. The resilience and imperceptibility are improved by choosing an appropriate embedding position. This paper gives a novel system to immerse the secret information in different videos with different methods. An audio and video steganography with novel amalgamations are implemented to immerse the confidential auditory information and the authentic user’s face image. A… More >

  • Open Access

    ARTICLE

    Multi-Layer Fog-Cloud Architecture for Optimizing the Placement of IoT Applications in Smart Cities

    Mohammad Aldossary*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 633-649, 2023, DOI:10.32604/cmc.2023.035414 - 06 February 2023

    Abstract In the smart city paradigm, the deployment of Internet of Things (IoT) services and solutions requires extensive communication and computing resources to place and process IoT applications in real time, which consumes a lot of energy and increases operational costs. Usually, IoT applications are placed in the cloud to provide high-quality services and scalable resources. However, the existing cloud-based approach should consider the above constraints to efficiently place and process IoT applications. In this paper, an efficient optimization approach for placing IoT applications in a multi-layer fog-cloud environment is proposed using a mathematical model (Mixed-Integer… More >

  • Open Access

    ARTICLE

    Development of Pandemic Monitoring System Based on Constellation of Nanosatellites

    Omar Ben Bahri*, Abdullah Alhumaidi Alotaibi

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1249-1263, 2023, DOI:10.32604/csse.2023.032677 - 20 January 2023

    Abstract Covid-19 is a global crisis and the greatest challenge we have faced. It affects people in different ways. Most infected people develop a mild to moderate form of the disease and recover without hospitalization. This presents a problem in spreading the pandemic with unintentionally manner. Thus, this paper provides a new technique for COVID-19 monitoring remotely and in wide range. The system is based on satellite technology that provides a pivotal solution for wireless monitoring. This mission requires a data collection technique which can be based on drones’ technology. Therefore, the main objective of our More >

  • Open Access

    ARTICLE

    Authentication of WSN for Secured Medical Data Transmission Using Diffie Hellman Algorithm

    A. Jenice Prabhu1,*, D. Hevin Rajesh2

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2363-2376, 2023, DOI:10.32604/csse.2023.028089 - 21 December 2022

    Abstract The applications of wireless sensor network (WSN) exhibits a significant rise in recent days since it is enveloped with various advantageous benefits. In the medical field, the emergence of WSN has created marvelous changes in monitoring the health conditions of the patients and so it is attracted by doctors and physicians. WSN assists in providing health care services without any delay and so it plays predominant role in saving the life of human. The data of different persons, time, places and networks have been linked with certain devices, which are collectively known as Internet of… More >

  • Open Access

    ARTICLE

    Secured Health Data Transmission Using Lagrange Interpolation and Artificial Neural Network

    S. Vidhya1,*, V. Kalaivani2

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2673-2692, 2023, DOI:10.32604/csse.2023.027724 - 21 December 2022

    Abstract In recent decades, the cloud computing contributes a prominent role in health care sector as the patient health records are transferred and collected using cloud computing services. The doctors have switched to cloud computing as it provides multiple advantageous measures including wide storage space and easy availability without any limitations. This necessitates the medical field to be redesigned by cloud technology to preserve information about patient’s critical diseases, electrocardiogram (ECG) reports, and payment details. The proposed work utilizes a hybrid cloud pattern to share Massachusetts Institute of Technology-Beth Israel Hospital (MIT-BIH) resources over the private… More >

  • Open Access

    ARTICLE

    LoRa Backscatter Network Efficient Data Transmission Using RF Source Range Control

    Dae-Young Kim1, SoYeon Lee2, Seokhoon Kim1,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4015-4025, 2023, DOI:10.32604/cmc.2023.027078 - 31 October 2022

    Abstract Networks based on backscatter communication provide wireless data transmission in the absence of a power source. A backscatter device receives a radio frequency (RF) source and creates a backscattered signal that delivers data; this enables new services in battery-less domains with massive Internet-of-Things (IoT) devices. Connectivity is highly energy-efficient in the context of massive IoT applications. Outdoors, long-range (LoRa) backscattering facilitates large IoT services. A backscatter network guarantees timeslot-and contention-based transmission. Timeslot-based transmission ensures data transmission, but is not scalable to different numbers of transmission devices. If contention-based transmission is used, collisions are unavoidable. To More >

  • Open Access

    ARTICLE

    Mobility Aware Zone-Based Routing in Vehicle Ad hoc Networks Using Hybrid Metaheuristic Algorithm

    C. Nandagopal1,*, P. Siva Kumar2, R. Rajalakshmi3, S. Anandamurugan4

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 113-126, 2023, DOI:10.32604/iasc.2023.031103 - 29 September 2022

    Abstract Vehicle Ad hoc Networks (VANETs) have high mobility and a randomized connection structure, resulting in extremely dynamic behavior. Several challenges, such as frequent connection failures, sustainability, multi-hop data transfer, and data loss, affect the effectiveness of Transmission Control Protocols (TCP) on such wireless ad hoc networks. To avoid the problem, in this paper, mobility-aware zone-based routing in VANET is proposed. To achieve this concept, in this paper hybrid optimization algorithm is presented. The hybrid algorithm is a combination of Ant colony optimization (ACO) and artificial bee colony optimization (ABC). The proposed hybrid algorithm is designed for… More >

  • Open Access

    ARTICLE

    Generative Adversarial Networks for Secure Data Transmission in Wireless Network

    E. Jayabalan*, R. Pugazendi

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3757-3784, 2023, DOI:10.32604/iasc.2023.031200 - 17 August 2022

    Abstract In this paper, a communication model in cognitive radios is developed and uses machine learning to learn the dynamics of jamming attacks in cognitive radios. It is designed further to make their transmission decision that automatically adapts to the transmission dynamics to mitigate the launched jamming attacks. The generative adversarial learning neural network (GALNN) or generative dynamic neural network (GDNN) automatically learns with the synthesized training data (training) with a generator and discriminator type neural networks that encompass minimax game theory. The elimination of the jamming attack is carried out with the assistance of the… More >

Displaying 11-20 on page 2 of 37. Per Page