Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,001)
  • Open Access

    ARTICLE

    Effect of UV Radiation and Other Abiotic Stress Factors on DNA of Different Wild Plant Species Grown in Three Successive Seasons in Alpine and Subalpine Regions

    Svetla P. Gateva1,*, Gabriele Jovtchev1, Tsveta V. Angelova1, Tzvetana P. Nonova2, Nikolay Tyutyundzhiev3, Elena G. Geleva2, Kostadin Katrandzhiev1, Nina A. Nikolova2, Dimitar Dimitrov4, Christo V. Angelov2

    Phyton-International Journal of Experimental Botany, Vol.91, No.2, pp. 293-313, 2022, DOI:10.32604/phyton.2022.016397 - 26 September 2021

    Abstract Plants in natural ecosystems are exposed to a combination of UV radiation, ionizing radiation (IR) and other abiotic factors. These factors change with the altitude. We investigated DNA alterations of some wild plants of different plant families in natural ecosystems at three altitudes in Rila Mountain, Bulgaria (1500, 1782, and 2925 m above sea level (a.s.l.) exposed to UV radiation, IR and other abiotic stresses, to assess the tolerance of plant species to the changing environmental conditions in three successive growth seasons. For this purpose, physicochemical, cytogenetic, and molecular methods were applied. DNA damage was assessed… More >

  • Open Access

    ARTICLE

    IoT Wireless Intrusion Detection and Network Traffic Analysis

    Vasaki Ponnusamy1, Aun Yichiet1, NZ Jhanjhi2,*, Mamoona humayun3, Maram Fahhad Almufareh3

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 865-879, 2022, DOI:10.32604/csse.2022.018801 - 24 September 2021

    Abstract Enhancement in wireless networks had given users the ability to use the Internet without a physical connection to the router. Almost every Internet of Things (IoT) devices such as smartphones, drones, and cameras use wireless technology (Infrared, Bluetooth, IrDA, IEEE 802.11, etc.) to establish multiple inter-device connections simultaneously. With the flexibility of the wireless network, one can set up numerous ad-hoc networks on-demand, connecting hundreds to thousands of users, increasing productivity and profitability significantly. However, the number of network attacks in wireless networks that exploit such flexibilities in setting and tearing down networks has become… More >

  • Open Access

    ARTICLE

    A CPK-Based Identity Authentication Scheme for IoT

    Mingming Zhang1, Jiaming Mao1,*, Yuanyuan Ma2, Liangjie Xu3, Chuanjun Wang1, Ran Zhao1, Zhihao Li3, Lu Chen4, Wenbing Zhao5

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1217-1231, 2022, DOI:10.32604/csse.2022.017657 - 24 September 2021

    Abstract As the power Internet of Things (IoT) enters the security construction stage, the massive use of perception layer devices urgently requires an identity authentication scheme that considers both security and practicality. The existing public key infrastructure (PKI)-based security authentication scheme is currently difficult to apply in many terminals in IoT. Its key distribution and management costs are high, which hinders the development of power IoT security construction. Combined Public Key (CPK) technology uses a small number of seeds to generate unlimited public keys. It is very suitable for identity authentication in the power Internet of… More >

  • Open Access

    ARTICLE

    Constructing a Deep Image Analysis System Based on Self-Driving and AIoT

    Wen-Tsai Sung1, Sung-Jung Hsiao2,*, Chung-Yen Hsiao1

    Intelligent Automation & Soft Computing, Vol.31, No.2, pp. 1223-1240, 2022, DOI:10.32604/iasc.2022.020746 - 22 September 2021

    Abstract This research is based on the system architecture of Edge Computing in the AIoT (Artificial Intelligence & Internet of Things) field. In terms of receiving data, the authors proposed approach employed the camera module as the video source, the ultrasound module as the distance measurement source, and then compile C++ with Raspberry Pi 4B for image lane analysis, while Jetson Nano uses the YOLOv3 algorithm for image object detection. The analysis results of the two single-board computers are transmitted to Motoduino U1 in binary form via GPIO, which is used for data integration and load… More >

  • Open Access

    ARTICLE

    Using Mobile Technology to Construct a Network Medical Health Care System

    Sung-Jung Hsiao1, Wen-Tsai Sung2,*

    Intelligent Automation & Soft Computing, Vol.31, No.2, pp. 729-748, 2022, DOI:10.32604/iasc.2022.020332 - 22 September 2021

    Abstract In this study, a multisensory physiological measurement system was built with wireless transmission technology, using a DSPIC30F4011 as the master control center and equipped with physiological signal acquisition modules such as an electrocardiogram module, blood pressure module, blood oxygen concentration module, and respiratory rate module. The physiological data were transmitted wirelessly to Android-based mobile applications via the TCP/IP or Bluetooth serial ports of Wi-Fi. The Android applications displayed the acquired physiological signals in real time and performed a preliminary abnormity diagnosis based on the measured physiological data and built-in index diagnostic data provided by doctors,… More >

  • Open Access

    ARTICLE

    Detecting Lung Cancer Using Machine Learning Techniques

    Ashit Kumar Dutta*

    Intelligent Automation & Soft Computing, Vol.31, No.2, pp. 1007-1023, 2022, DOI:10.32604/iasc.2022.019778 - 22 September 2021

    Abstract In recent days, Internet of Things (IoT) based image classification technique in the healthcare services is becoming a familiar concept that supports the process of detecting cancers with Computer Tomography (CT) images. Lung cancer is one of the perilous diseases that increases the mortality rate exponentially. IoT based image classifiers have the ability to detect cancer at an early stage and increases the life span of a patient. It supports oncologist to monitor and evaluate the health condition of a patient. Also, it can decipher cancer risk marker and act upon them. The process of… More >

  • Open Access

    REVIEW

    A Review on Privacy Preservation of Location-Based Services in Internet of Things

    Raniyah Wazirali*

    Intelligent Automation & Soft Computing, Vol.31, No.2, pp. 767-779, 2022, DOI:10.32604/iasc.2022.019243 - 22 September 2021

    Abstract Internet of Things (IoT) has become popular with the rapid development of sensing devices, and it offers a large number of services. Location data is one of the most important information required for IoT systems. With the widespread of Location Based Services (LBS) applications, the privacy and security threats are also emerging. Recently, a large number of studies focused on localization and positioning functionalities, however, the risk associated with user privacy has not been sufficiently addressed so far. Therefore, privacy and security of device location in IoT systems is an active area of research. Since… More >

  • Open Access

    ARTICLE

    Data Traffic Reduction with Compressed Sensing in an AIoT System

    Hye-Min Kwon1, Seng-Phil Hong2, Mingoo Kang1, Jeongwook Seo1,*

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1769-1780, 2022, DOI:10.32604/cmc.2022.020027 - 07 September 2021

    Abstract To provide Artificial Intelligence (AI) services such as object detection, Internet of Things (IoT) sensor devices should be able to send a large amount of data such as images and videos. However, this inevitably causes IoT networks to be severely overloaded. In this paper, therefore, we propose a novel oneM2M-compliant Artificial Intelligence of Things (AIoT) system for reducing overall data traffic and offering object detection. It consists of some IoT sensor devices with random sampling functions controlled by a compressed sensing (CS) rate, an IoT edge gateway with CS recovery and domain transform functions related… More >

  • Open Access

    ARTICLE

    Droid-IoT: Detect Android IoT Malicious Applications Using ML and Blockchain

    Hani Mohammed Alshahrani*

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 739-766, 2022, DOI:10.32604/cmc.2022.019623 - 07 September 2021

    Abstract One of the most rapidly growing areas in the last few years is the Internet of Things (IoT), which has been used in widespread fields such as healthcare, smart homes, and industries. Android is one of the most popular operating systems (OS) used by IoT devices for communication and data exchange. Android OS captured more than 70 percent of the market share in 2021. Because of the popularity of the Android OS, it has been targeted by cybercriminals who have introduced a number of issues, such as stealing private information. As reported by one of… More >

  • Open Access

    ARTICLE

    IoT Information Status Using Data Fusion and Feature Extraction Method

    S. S. Saranya*, N. Sabiyath Fatima

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1857-1874, 2022, DOI:10.32604/cmc.2022.019621 - 07 September 2021

    Abstract The Internet of Things (IoT) role is instrumental in the technological advancement of the healthcare industry. Both the hardware and the core level of software platforms are the progress resulted from the accompaniment of Medicine 4.0. Healthcare IoT systems are the emergence of this foresight. The communication systems between the sensing nodes and the processors; and the processing algorithms to produce output obtained from the data collected by the sensors are the major empowering technologies. At present, many new technologies supplement these empowering technologies. So, in this research work, a practical feature extraction and classification… More >

Displaying 721-730 on page 73 of 1001. Per Page