Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (964)
  • Open Access

    ARTICLE

    ETM-IoT: Energy-Aware Threshold Model for Heterogeneous Communication in the Internet of Things

    A. Vijaya Krishna1, A. Anny Leema2,*

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1815-1827, 2022, DOI:10.32604/cmc.2022.018455 - 07 September 2021

    Abstract The internet of things (IoT) has a wide variety of applications, which in turn raises many challenging issues. IoT technology enables devices to closely monitor their environment, providing context-aware intelligence based on the real-time data collected by their sensor nodes. The IoT not only controls these devices but also monitors their user's behaviour. One of the major issues related to IoT is the need for an energy-efficient communication protocol which uses the heterogeneity and diversity of the objects connected through the internet. Minimizing energy consumption is a requirement for energy-constrained nodes and outsourced nodes. The… More >

  • Open Access

    ARTICLE

    Energy Efficient Cluster-Based Optimal Resource Management in IoT Environment

    J. V. Anchitaalagammai1, T. Jayasankar2,*, P. Selvaraj3, Mohamed Yacin Sikkandar4, M. Zakarya5,6, Mohamed Elhoseny7, K. Shankar8

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1247-1261, 2022, DOI:10.32604/cmc.2022.017910 - 07 September 2021

    Abstract Internet of Things (IoT) is a technological revolution that redefined communication and computation of modern era. IoT generally refers to a network of gadgets linked via wireless network and communicates via internet. Resource management, especially energy management, is a critical issue when designing IoT devices. Several studies reported that clustering and routing are energy efficient solutions for optimal management of resources in IoT environment. In this point of view, the current study devises a new Energy-Efficient Clustering-based Routing technique for Resource Management i.e., EECBRM in IoT environment. The proposed EECBRM model has three stages namely, fuzzy logic-based More >

  • Open Access

    ARTICLE

    Cloud-IoT Integration: Cloud Service Framework for M2M Communication

    Saadia Malik1, Nadia Tabassum2, Muhammad Saleem3, Tahir Alyas4, Muhammad Hamid5,*, Umer Farooq4

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 471-480, 2022, DOI:10.32604/iasc.2022.019837 - 03 September 2021

    Abstract With the ongoing revolution in the Internet of Things (IoT) and cloud computing has made the potential of every stack holder that is connected through the Internet, to exchange and transfer data. Various users perceive this connection and interaction with devices as very helpful and serviceable in their daily life. However, an improperly configured network system is a soft target to security threats, therefore there is a dire need for a security embedded framework for IoT and cloud communication models is the latest research area. In this paper, different IoT and cloud computing frameworks are… More >

  • Open Access

    ARTICLE

    Smart Mina: LoRaWAN Technology for Smart Fire Detection Application for Hajj Pilgrimage

    Mohammad Al Mojamed*

    Computer Systems Science and Engineering, Vol.40, No.1, pp. 259-272, 2022, DOI:10.32604/csse.2022.018458 - 26 August 2021

    Abstract The Long-Range Wide Area Network (LoRaWAN) is one of the used communication systems that serve and enables the deployment of the Internet of Things (IoT), which occasionally transmit small size data. As part of the Low Power Wide Area Network (LPWAN), LoRaWAN is characterized by its ability for low power consumption. In addition, it is built to provide more extended coverage and higher capacity with minimum cost. In this paper, we investigate the feasibility and scalability of LoRaWAN for the Mina area using a realistic network model. Mina, known as the world’s largest tent city,… More >

  • Open Access

    ARTICLE

    An IoT-Aware System for Managing Patients’ Waiting Time Using Bluetooth Low-Energy Technology

    Reham Alabduljabbar*

    Computer Systems Science and Engineering, Vol.40, No.1, pp. 1-16, 2022, DOI:10.32604/csse.2022.018102 - 26 August 2021

    Abstract It is a common observation that whenever patients arrives at the front desk of a hospital, outpatient clinic, or other health-associated centers, they have to first queue up in a line and wait to fill in their registration form to get admitted. The long waiting time without any status updates is the most common complaint, concerning health officials. In this paper, UrNext, a location-aware mobile-based solution using Bluetooth low-energy (BLE) technology is presented to solve the problem. Recently, a technology-oriented method, the Internet of Things (IoT), has been gaining popularity in helping to solve some… More >

  • Open Access

    ARTICLE

    Intrusion Detection Method of Internet of Things Based on Multi GBDT Feature Dimensionality Reduction and Hierarchical Traffic Detection

    Taifeng Pan*

    Journal of Quantum Computing, Vol.3, No.4, pp. 161-171, 2021, DOI:10.32604/jqc.2021.025373 - 10 January 2022

    Abstract The rapid development of Internet of Things (IoT) technology has brought great convenience to people’s life. However, the security protection capability of IoT is weak and vulnerable. Therefore, more protection needs to be done for the security of IoT. The paper proposes an intrusion detection method for IoT based on multi GBDT feature reduction and hierarchical traffic detection model. Firstly, GBDT is used to filter the features of IoT traffic data sets BoT-IoT and UNSW-NB15 to reduce the traffic feature dimension. At the same time, in order to improve the reliability of feature filtering, this… More >

  • Open Access

    ARTICLE

    Wearable Sensors and Internet of Things Integration to Track and Monitor Children Students with Chronic Diseases Using Arduino UNO

    Ali Abdulameer Aldujaili1, Mohammed Dauwed2, Ahmed Meri3,*

    Journal on Internet of Things, Vol.3, No.4, pp. 131-137, 2021, DOI:10.32604/jiot.2021.015994 - 30 December 2021

    Abstract Parents concerns for their children who has a critical health conditions may limit the children movements and live to engage with others peers anytime and anywhere. Thus, in this study aims to propose a framework to help the children who has critical disease to have more activity and engagement with other peers. Additionally, reducing their parents’ concerns by providing monitoring and tracking system to their parents for their children health conditions. However, this study proposed a framework include tracking and monitoring wearable (TMW) device and decision system to alert healthcare providers and parents for any More >

  • Open Access

    ARTICLE

    A Hybrid Intrusion Detection Model Based on Spatiotemporal Features

    Linbei Wang1 , Zaoyu Tao1, Lina Wang2,*, Yongjun Ren3

    Journal of Quantum Computing, Vol.3, No.3, pp. 107-118, 2021, DOI:10.32604/jqc.2021.016857 - 21 December 2021

    Abstract With the accelerating process of social informatization, our personal information security and Internet sites, etc., have been facing a series of threats and challenges. Recently, well-developed neural network has seen great advancement in natural language processing and computer vision, which is also adopted in intrusion detection. In this research, a hybrid model integrating MultiScale Convolutional Neural Network and Long Short-term Memory Network (MSCNN-LSTM) is designed to conduct the intrusion detection. Multi-Scale Convolutional Neural Network (MSCNN) is used to extract the spatial characteristics of data sets. And Long Short-term Memory Network (LSTM) is responsible for processing More >

  • Open Access

    ARTICLE

    IOTA-Based Data Encryption Storage and Retrieval Method

    Hongchao Ma1,*, Yi Man1, Xiao Xing2, Zihan Zhuo2, Mo Chen3

    Journal of Quantum Computing, Vol.3, No.3, pp. 97-105, 2021, DOI:10.32604/jqc.2021.016775 - 21 December 2021

    Abstract At present, the traditional blockchain for data storage and retrieval reflects the characteristics of slow data uploading speed, high cost, and transparency, and there are a lot of corresponding problems, such as not supporting private data storage, large data operation costs, and not supporting Data field query. This paper proposes a method of data encryption storage and retrieval based on the IOTA distributed ledger, combined with the fast transaction processing speed and zero-value transactions of the IOTA blockchain, through the Masked Authenticated Messaging technology, so that the data is encrypted in the data stream. The More >

  • Open Access

    ARTICLE

    Security Attacks on the IoT Network with 5G Wireless Communication

    Ghada Sultan Aljumaie, Ghada Hisham Alzeer, Sultan S. Alshamrani*

    Journal on Internet of Things, Vol.3, No.3, pp. 119-130, 2021, DOI:10.32604/jiot.2021.015900 - 16 December 2021

    Abstract The term Internet of Things has increased in popularity in recent years and has spread to be used in many applications around us, such as healthcare applications, smart homes and smart cities, IoT is a group of smart devices equipped with sensors that have the ability to calculate data, and carry out actions in the environment in which they are located, they are connected to each other through the Internet and recently it has become supported by 5G technology due to many advantages such as its ability to provide a fast connection, despite the efficiency More >

Displaying 701-710 on page 71 of 964. Per Page