Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (791)
  • Open Access

    ARTICLE

    Smart Security Framework for Educational Institutions Using Internet of Things (IoT)

    Afzal Badshah1, Anwar Ghani1, Muhammad Ahsan Qureshi2, Shahaboddin Shamshirband,3,4,*

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 81-101, 2019, DOI:10.32604/cmc.2019.06288

    Abstract Educational institutions are soft targets for the terrorist with massive and defenseless people. In the recent past, numbers of such attacks have been executed around the world. Conducting research, in order to provide a secure environment to the educational institutions is a challenging task. This effort is motivated by recent assaults, made at Army Public School Peshawar, following another attack at Charsada University, Khyber Pukhtun Khwa, Pakistan and also the Santa Fe High School Texas, USA massacre. This study uses the basic technologies of edge computing, cloud computing and IoT to design a smart emergency alarm system framework. IoT is… More >

  • Open Access

    ARTICLE

    High Precision SAR ADC Using CNTFET for Internet of Things

    V. Gowrishankar1,*, K. Venkatachalam1

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 947-957, 2019, DOI:10.32604/cmc.2019.07749

    Abstract A high precision 10-bit successive approximation register analog to digital converter (ADC) designed and implemented in 32nm CNTFET process technology at the supply of 0.6V, with 73.24 dB SNDR at a sampling rate of 640 MS/s with the average power consumption of 120.2 μW for the Internet of things node. The key components in CNTFET SAR ADCs are binary scaled charge redistribution digital to analog converter using MOS capacitors, CNTFET based dynamic latch comparator and simple SAR digital code error correction logic. These techniques are used to increase the sampling rate and precision while ensuring the linearity, power consumption and… More >

  • Open Access

    ARTICLE

    Enabling Comparable Search Over Encrypted Data for IoT with Privacy-Preserving

    Lei Xu1, Chungen Xu1,*, Zhongyi Liu1, Yunling Wang2,3, Jianfeng Wang2,3

    CMC-Computers, Materials & Continua, Vol.60, No.2, pp. 675-690, 2019, DOI:10.32604/cmc.2019.05276

    Abstract With the rapid development of cloud computing and Internet of Things (IoT) technology, massive data raises and shuttles on the network every day. To ensure the confidentiality and utilization of these data, industries and companies users encrypt their data and store them in an outsourced party. However, simple adoption of encryption scheme makes the original lose its flexibility and utilization. To address these problems, the searchable encryption scheme is proposed. Different from traditional encrypted data search scheme, this paper focuses on providing a solution to search the data from one or more IoT device by comparing their underlying numerical values.… More >

  • Open Access

    ARTICLE

    A Dual-Chaining Watermark Scheme for Data Integrity Protection in Internet of Things

    Baowei Wang1,2,*, Weiwen Kong1, Wei Li1, Neal N. Xiong3

    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 679-695, 2019, DOI:10.32604/cmc.2019.06106

    Abstract Chaining watermark is an effective way to verify the integrity of streaming data in wireless network environment, especially in resource-constrained sensor networks, such as the perception layer of Internet of Things applications. However, in all existing single chaining watermark schemes, how to ensure the synchronization between the data sender and the receiver is still an unsolved problem. Once the synchronization points are attacked by the adversary, existing data integrity authentication schemes are difficult to work properly, and the false negative rate might be up to 50 percent. And the additional fixed group delimiters not only increase the data size, but… More >

  • Open Access

    ARTICLE

    An Asynchronous Clustering and Mobile Data Gathering Schema Based on Timer Mechanism in Wireless Sensor Networks

    Jin Wang1,2,3, Yu Gao3, Wei Liu3, Wenbing Wu1, Se-Jung Lim4,*

    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 711-725, 2019, DOI:10.32604/cmc.2019.05450

    Abstract Recently, Wireless sensor networks (WSNs) have become very popular research topics which are applied to many applications. They provide pervasive computing services and techniques in various potential applications for the Internet of Things (IoT). An Asynchronous Clustering and Mobile Data Gathering based on Timer Mechanism (ACMDGTM) algorithm is proposed which would mitigate the problem of “hot spots” among sensors to enhance the lifetime of networks. The clustering process takes sensors’ location and residual energy into consideration to elect suitable cluster heads. Furthermore, one mobile sink node is employed to access cluster heads in accordance with the data overflow time and… More >

  • Open Access

    ARTICLE

    WiBPA: An Efficient Data Integrity Auditing Scheme Without Bilinear Pairings

    Chunhua Li1,*, Peng Wang1, Changhong Sun1, Ke Zhou1, Ping Huang2

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 319-333, 2019, DOI:10.32604/cmc.2019.03856

    Abstract The security of cloud data has always been a concern. Cloud server provider may maliciously tamper or delete user’s data for their own benefit, so data integrity audit is of great significance to verify whether data is modified or not. Based on the general three-party audit architecture, a dynamic auditing scheme without bilinear pairings is proposed in this paper. It utilizes exponential operation instead of bilinear mapping to verify the validity of evidence. By establishing the mapping relation between logic index and tag index of data block with index transformation table, our scheme can easily support dynamic data operation. By… More >

  • Open Access

    ARTICLE

    A Fuzzy Approach for an IoT-based Automated Employee Performance Appraisal

    Jaideep Kaur1, Kamaljit Kaur2

    CMC-Computers, Materials & Continua, Vol.53, No.1, pp. 23-36, 2017, DOI:10.3970/cmc.2017.053.024

    Abstract The ubiquitous Internet of Things (IoT) through RFIDs, GPS, NFC and other wireless devices is capable of sensing the activities being carried around Industrial environment so as to automate industrial processes. In almost every industry, employee performance appraisal is done manually which may lead to favoritisms. This paper proposes a framework to perform automatic employee performance appraisal based on data sensed from IoT. The framework classifies raw IoT data into three activities (Positive, Negative, Neutral), co-locates employee and activity in order to calculate employee implication and then performs cognitive decision making using fuzzy logic. From the experiments carried out it… More >

  • Open Access

    ARTICLE

    Wave Propagation in Functionally Graded Piezoelectric-piezomagnetic Rectangular Rings

    Yuchun Duan1, Xiaoming Zhang2,3, Yuqing Wang2, Jiangong Yu2

    CMC-Computers, Materials & Continua, Vol.43, No.3, pp. 153-174, 2014, DOI:10.3970/cmc.2014.043.153

    Abstract The ring ultrasonic transducers are widely used in the ocean engineering and medical fields. This paper proposes a double orthogonal polynomial series approach to solve the wave propagation problem in a functionally graded piezoelectric-piezomagnetic (FGPP) ring with a rectangular cross-section. Through numerical comparison with the available reference results for a pure elastic homogeneous rectangular bar, the validity of the proposed approach is illustrated. The dispersion curves and displacement distributions of various FGPP rectangular bars are calculated to reveal their wave characteristics. The results can be used for the design and optimization of the ring FGPP transducers. More >

  • Open Access

    ARTICLE

    A Meshless Numerical Method for Kirchhoff Plates under Arbitrary Loadings

    Chia-Cheng Tsai 1

    CMC-Computers, Materials & Continua, Vol.22, No.3, pp. 197-218, 2011, DOI:10.3970/cmc.2011.022.197

    Abstract This paper describes the combination of the method of fundamental solutions (MFS) and the dual reciprocity method (DRM) as a meshless numerical method to solve problems of Kirchhoff plates under arbitrary loadings. In the solution procedure, a arbitrary distributed loading is first approximated by either the multiquadrics (MQ) or the augmented polyharmonic splines (APS), which are constructed by splines and monomials. The particular solutions of multiquadrics, splines and monomials are all derived analytically and explicitly. Then, the complementary solutions are solved formally by the MFS. Furthermore, the boundary conditions of lateral displacement, slope, normal moment, and effective shear force are… More >

  • Open Access

    ARTICLE

    Effects of TGO Roughness on Indentation Response of Thermal Barrier Coatings

    Taotao Hu1, gping Shen1,2

    CMC-Computers, Materials & Continua, Vol.17, No.1, pp. 41-58, 2010, DOI:10.3970/cmc.2010.017.041

    Abstract In this paper, an axisymmetric indentation model is set up to calculate the effects of the roughness of the thermally grown oxide (TGO) layer, which was modeled as a sinusoidal wave, on the indentation response of the thermal barrier coatings. It is found that the amplitude, wavelength, and thickness of the thermally grown oxide layer have obvious influences on the indentation response, while the effect of the indenter position can be neglected. In the top coating layer, residual stress mainly occurs below the indenter and around the nearest two peaks of the thermally grown oxide layer to the indenter. Only… More >

Displaying 781-790 on page 79 of 791. Per Page