Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (858)
  • Open Access

    ARTICLE

    Energy-Efficient and Blockchain-Enabled Model for Internet of Things (IoT) in Smart Cities

    Norah Saleh Alghamdi1,*, Mohammad Ayoub Khan2

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2509-2524, 2021, DOI:10.32604/cmc.2021.014180 - 28 December 2020

    Abstract Wireless sensor networks (WSNs) and Internet of Things (IoT) have gained more popularity in recent years as an underlying infrastructure for connected devices and sensors in smart cities. The data generated from these sensors are used by smart cities to strengthen their infrastructure, utilities, and public services. WSNs are suitable for long periods of data acquisition in smart cities. To make the networks of smart cities more reliable for sensitive information, the blockchain mechanism has been proposed. The key issues and challenges of WSNs in smart cities is efficiently scheduling the resources; leading to extending More >

  • Open Access

    ARTICLE

    OTS Scheme Based Secure Architecture for Energy-Efficient IoT in Edge Infrastructure

    Sushil Kumar Singh1, Yi Pan2, Jong Hyuk Park1,*

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2905-2922, 2021, DOI:10.32604/cmc.2021.014151 - 28 December 2020

    Abstract For the past few decades, the Internet of Things (IoT) has been one of the main pillars wielding significant impact on various advanced industrial applications, including smart energy, smart manufacturing, and others. These applications are related to industrial plants, automation, and e-healthcare fields. IoT applications have several issues related to developing, planning, and managing the system. Therefore, IoT is transforming into G-IoT (Green Internet of Things), which realizes energy efficiency. It provides high power efficiency, enhances communication and networking. Nonetheless, this paradigm did not resolve all smart applications’ challenges in edge infrastructure, such as communication More >

  • Open Access

    ARTICLE

    Robust Attack Detection Approach for IIoT Using Ensemble Classifier

    V. Priya1, I. Sumaiya Thaseen1, Thippa Reddy Gadekallu1, Mohamed K. Aboudaif2,*, Emad Abouel Nasr3

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2457-2470, 2021, DOI:10.32604/cmc.2021.013852 - 28 December 2020

    Abstract Generally, the risks associated with malicious threats are increasing for the Internet of Things (IoT) and its related applications due to dependency on the Internet and the minimal resource availability of IoT devices. Thus, anomaly-based intrusion detection models for IoT networks are vital. Distinct detection methodologies need to be developed for the Industrial Internet of Things (IIoT) network as threat detection is a significant expectation of stakeholders. Machine learning approaches are considered to be evolving techniques that learn with experience, and such approaches have resulted in superior performance in various applications, such as pattern recognition,… More >

  • Open Access

    ARTICLE

    Data Security Storage Model of the Internet of Things Based on Blockchain

    Pingshui Wang1,2,*, Willy Susilo2

    Computer Systems Science and Engineering, Vol.36, No.1, pp. 213-224, 2021, DOI:10.32604/csse.2021.014541 - 23 December 2020

    Abstract With the development of information technology, the Internet of Things (IoT) has gradually become the third wave of the worldwide information industry revolution after the computer and the Internet. The application of the IoT has brought great convenience to people’s production and life. However, the potential information security problems in various IoT applications are gradually exposed and people pay more attention to them. The traditional centralized data storage and management model of the IoT is easy to cause transmission delay, single point of failure, privacy disclosure and other problems, and eventually leads to unpredictable behavior More >

  • Open Access

    ARTICLE

    A Model Transformation Approach for Detecting Distancing Violations in Weighted Graphs

    Ahmad F. Subahi*

    Computer Systems Science and Engineering, Vol.36, No.1, pp. 13-39, 2021, DOI:10.32604/csse.2021.014376 - 23 December 2020

    Abstract This work presents the design of an Internet of Things (IoT) edge-based system based on model transformation and complete weighted graph to detect violations of social distancing measures in indoor public places. A wireless sensor network based on Bluetooth Low Energy is introduced as the infrastructure of the proposed design. A hybrid model transformation strategy for generating a graph database to represent groups of people is presented as a core middleware layer of the detecting system’s proposed architectural design. A Neo4j graph database is used as a target implementation generated from the proposed transformational system… More >

  • Open Access

    ARTICLE

    IoT Technologies for Tackling COVID-19 in Malaysia and Worldwide: Challenges, Recommendations, and Proposed Framework

    Ali Saadon Al-Ogaili1,*, Ameer Alhasan2, Agileswari Ramasamy1, Marayati Binti Marsadek1, Tengku Juhana Tengku Hashim1, Ammar Al-Sharaa3, Mastura Binti Aadam3, Lukman Audah2

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 2141-2164, 2021, DOI:10.32604/cmc.2020.013440 - 26 November 2020

    Abstract The Coronavirus (COVID-19) pandemic is considered as a global public health challenge. To contain this pandemic, different measures are being taken globally. The Internet of Things (IoT) has been represented as one of the most important schemes that has been considered to fight the spread of COVID-19 in the world, practically Malaysia. In fact, there are many sectors in Malaysia would be transformed into smart services by using IoT technologies, particularly energy, transportation, healthcare sectors. This manuscript presents a comprehensive review of the IoT technologies that are being used currently in Malaysia to accelerate the… More >

  • Open Access

    ARTICLE

    An IoT-Cloud Based Intelligent Computer-Aided Diagnosis of Diabetic Retinopathy Stage Classification Using Deep Learning Approach

    K. Shankar1,*, Eswaran Perumal1, Mohamed Elhoseny2, Phong Thanh Nguyen3

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1665-1680, 2021, DOI:10.32604/cmc.2020.013251 - 26 November 2020

    Abstract Diabetic retinopathy (DR) is a disease with an increasing prevalence and the major reason for blindness among working-age population. The possibility of severe vision loss can be extensively reduced by timely diagnosis and treatment. An automated screening for DR has been identified as an effective method for early DR detection, which can decrease the workload associated to manual grading as well as save diagnosis costs and time. Several studies have been carried out to develop automated detection and classification models for DR. This paper presents a new IoT and cloud-based deep learning for healthcare diagnosis… More >

  • Open Access

    ARTICLE

    Three-Dimensional Distance-Error-Correction-Based Hop Localization Algorithm for IoT Devices

    Deepak Prashar1, Gyanendra Prasad Joshi2, Sudan Jha1, Eunmok Yang3, Kwang Chul Son4,*

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1529-1549, 2021, DOI:10.32604/cmc.2020.012986 - 26 November 2020

    Abstract The Internet of Things (IoT) is envisioned as a network of various wireless sensor nodes communicating with each other to offer state-of-the-art solutions to real-time problems. These networks of wireless sensors monitor the physical environment and report the collected data to the base station, allowing for smarter decisions. Localization in wireless sensor networks is to localize a sensor node in a two-dimensional plane. However, in some application areas, such as various surveillances, underwater monitoring systems, and various environmental monitoring applications, wireless sensors are deployed in a three-dimensional plane. Recently, localization-based applications have emerged as one… More >

  • Open Access

    ARTICLE

    Deep Learning Based Intelligent and Sustainable Smart Healthcare Application in Cloud-Centric IoT

    K. V. Praveen1, P. M. Joe Prathap2, S. Dhanasekaran3, I. S. Hephzi Punithavathi4, P. Duraipandy5, Irina V. Pustokhina6, Denis A. Pustokhin7,*

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1987-2003, 2021, DOI:10.32604/cmc.2020.012398 - 26 November 2020

    Abstract Recent developments in information technology can be attributed to the development of smart cities which act as a key enabler for next-generation intelligent systems to improve security, reliability, and efficiency. The healthcare sector becomes advantageous and offers different ways to manage patient information in order to improve healthcare service quality. The futuristic sustainable computing solutions in e-healthcare applications depend upon Internet of Things (IoT) in cloud computing environment. The energy consumed during data communication from IoT devices to cloud server is significantly high and it needs to be reduced with the help of clustering techniques.… More >

  • Open Access

    ARTICLE

    Memetic Optimization with Cryptographic Encryption for Secure Medical Data Transmission in IoT-Based Distributed Systems

    Srinath Doss1, Jothi Paranthaman2, Suseendran Gopalakrishnan3, Akila Duraisamy3, Souvik Pal4, Balaganesh Duraisamy5, Chung Le Van6,*, Dac-Nhuong Le7

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1577-1594, 2021, DOI:10.32604/cmc.2020.012379 - 26 November 2020

    Abstract In the healthcare system, the Internet of Things (IoT) based distributed systems play a vital role in transferring the medical-related documents and information among the organizations to reduce the replication in medical tests. This datum is sensitive, and hence security is a must in transforming the sensational contents. In this paper, an Evolutionary Algorithm, namely the Memetic Algorithm is used for encrypting the text messages. The encrypted information is then inserted into the medical images using Discrete Wavelet Transform 1 level and 2 levels. The reverse method of the Memetic Algorithm is implemented when extracting More >

Displaying 721-730 on page 73 of 858. Per Page