Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (529)
  • Open Access

    ARTICLE

    Efficient and Secure IoT Based Smart Home Automation Using Multi-Model Learning and Blockchain Technology

    Nazik Alturki1, Raed Alharthi2, Muhammad Umer3,*, Oumaima Saidani1, Amal Alshardan1, Reemah M. Alhebshi4, Shtwai Alsubai5, Ali Kashif Bashir6,7,8,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3387-3415, 2024, DOI:10.32604/cmes.2023.044700

    Abstract The concept of smart houses has grown in prominence in recent years. Major challenges linked to smart homes are identification theft, data safety, automated decision-making for IoT-based devices, and the security of the device itself. Current home automation systems try to address these issues but there is still an urgent need for a dependable and secure smart home solution that includes automatic decision-making systems and methodical features. This paper proposes a smart home system based on ensemble learning of random forest (RF) and convolutional neural networks (CNN) for programmed decision-making tasks, such as categorizing gadgets as “OFF” or “ON” based… More >

  • Open Access

    ARTICLE

    Traffic-Aware Fuzzy Classification Model to Perform IoT Data Traffic Sourcing with the Edge Computing

    Huixiang Xu*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2309-2335, 2024, DOI:10.32604/cmc.2024.046253

    Abstract The Internet of Things (IoT) has revolutionized how we interact with and gather data from our surrounding environment. IoT devices with various sensors and actuators generate vast amounts of data that can be harnessed to derive valuable insights. The rapid proliferation of Internet of Things (IoT) devices has ushered in an era of unprecedented data generation and connectivity. These IoT devices, equipped with many sensors and actuators, continuously produce vast volumes of data. However, the conventional approach of transmitting all this data to centralized cloud infrastructures for processing and analysis poses significant challenges. However, transmitting all this data to a… More >

  • Open Access

    ARTICLE

    Advanced Optimized Anomaly Detection System for IoT Cyberattacks Using Artificial Intelligence

    Ali Hamid Farea1,*, Omar H. Alhazmi1, Kerem Kucuk2

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1525-1545, 2024, DOI:10.32604/cmc.2023.045794

    Abstract While emerging technologies such as the Internet of Things (IoT) have many benefits, they also pose considerable security challenges that require innovative solutions, including those based on artificial intelligence (AI), given that these techniques are increasingly being used by malicious actors to compromise IoT systems. Although an ample body of research focusing on conventional AI methods exists, there is a paucity of studies related to advanced statistical and optimization approaches aimed at enhancing security measures. To contribute to this nascent research stream, a novel AI-driven security system denoted as “AI2AI” is presented in this work. AI2AI employs AI techniques to… More >

  • Open Access

    ARTICLE

    Internet Use and Mental Health among Older Adults in China: Beneficial for Those Who Lack of Intergenerational Emotional Support or Suffering from Chronic Diseases?

    Yuxin Wang1,2,*, Jia Shi1,2

    International Journal of Mental Health Promotion, Vol.26, No.1, pp. 69-80, 2024, DOI:10.32604/ijmhp.2023.044641

    Abstract In the 21st century, the rapid growth of the Internet has presented a significant avenue for China to respond actively to the aging population and promote the “Healthy China” strategy in an orderly manner. This study uses panel data from the China Health and Retirement Longitudinal Study (CHARLS) to empirically investigate the influence of Internet use on the mental health of older adults, particularly those who lack intergenerational emotional support and suffer from chronic diseases. This study employs a multi-period difference-in-differences (DID) method and a two-stage instrumental variable approach to address the endogenous problem. Results show that Internet use has… More >

  • Open Access

    ARTICLE

    Lightweight Intrusion Detection Using Reservoir Computing

    Jiarui Deng1,2, Wuqiang Shen1,3, Yihua Feng4, Guosheng Lu5, Guiquan Shen1,3, Lei Cui1,3, Shanxiang Lyu1,2,*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1345-1361, 2024, DOI:10.32604/cmc.2023.047079

    Abstract The blockchain-empowered Internet of Vehicles (IoV) enables various services and achieves data security and privacy, significantly advancing modern vehicle systems. However, the increased frequency of data transmission and complex network connections among nodes also make them more susceptible to adversarial attacks. As a result, an efficient intrusion detection system (IDS) becomes crucial for securing the IoV environment. Existing IDSs based on convolutional neural networks (CNN) often suffer from high training time and storage requirements. In this paper, we propose a lightweight IDS solution to protect IoV against both intra-vehicle and external threats. Our approach achieves superior performance, as demonstrated by… More >

  • Open Access

    ARTICLE

    A Blockchain-Based Access Control Scheme for Reputation Value Attributes of the Internet of Things

    Hongliang Tian, Junyuan Tian*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1297-1310, 2024, DOI:10.32604/cmc.2024.047058

    Abstract The Internet of Things (IoT) access control mechanism may encounter security issues such as single point of failure and data tampering. To address these issues, a blockchain-based IoT reputation value attribute access control scheme is proposed. Firstly, writing the reputation value as an attribute into the access control policy, and then deploying the access control policy in the smart contract of the blockchain system can enable the system to provide more fine-grained access control; Secondly, storing a large amount of resources from the Internet of Things in Inter Planetary File System (IPFS) to improve system throughput; Finally, map resource access… More >

  • Open Access

    ARTICLE

    An Industrial Intrusion Detection Method Based on Hybrid Convolutional Neural Networks with Improved TCN

    Zhihua Liu, Shengquan Liu*, Jian Zhang

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 411-433, 2024, DOI:10.32604/cmc.2023.046237

    Abstract Network intrusion detection systems (NIDS) based on deep learning have continued to make significant advances. However, the following challenges remain: on the one hand, simply applying only Temporal Convolutional Networks (TCNs) can lead to models that ignore the impact of network traffic features at different scales on the detection performance. On the other hand, some intrusion detection methods consider multi-scale information of traffic data, but considering only forward network traffic information can lead to deficiencies in capturing multi-scale temporal features. To address both of these issues, we propose a hybrid Convolutional Neural Network that supports a multi-output strategy (BONUS) for… More >

  • Open Access

    ARTICLE

    Enhancing IoT Security: Quantum-Level Resilience against Threats

    Hosam Alhakami*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 329-356, 2024, DOI:10.32604/cmc.2023.043439

    Abstract The rapid growth of the Internet of Things (IoT) operations has necessitated the incorporation of quantum computing technologies to meet its expanding needs. This integration is motivated by the need to solve the specific issues provided by the expansion of IoT and the potential benefits that quantum computing can offer in this scenario. The combination of IoT and quantum computing creates new privacy and security problems. This study examines the critical need to prevent potential security concerns from quantum computing in IoT applications. We investigate the incorporation of quantum computing approaches within IoT security frameworks, with a focus on developing… More >

  • Open Access

    ARTICLE

    Smart Healthcare Activity Recognition Using Statistical Regression and Intelligent Learning

    K. Akilandeswari1, Nithya Rekha Sivakumar2,*, Hend Khalid Alkahtani3, Shakila Basheer3, Sara Abdelwahab Ghorashi2

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1189-1205, 2024, DOI:10.32604/cmc.2023.034815

    Abstract In this present time, Human Activity Recognition (HAR) has been of considerable aid in the case of health monitoring and recovery. The exploitation of machine learning with an intelligent agent in the area of health informatics gathered using HAR augments the decision-making quality and significance. Although many research works conducted on Smart Healthcare Monitoring, there remain a certain number of pitfalls such as time, overhead, and falsification involved during analysis. Therefore, this paper proposes a Statistical Partial Regression and Support Vector Intelligent Agent Learning (SPR-SVIAL) for Smart Healthcare Monitoring. At first, the Statistical Partial Regression Feature Extraction model is used… More >

  • Open Access

    ARTICLE

    Physics Based Digital Twin Modelling from Theory to Concept Implementation Using Coiled Springs Used in Suspension Systems

    Mohamed Ammar1,*, Alireza Mousavi1, Hamed Al-Raweshidy2,*

    Digital Engineering and Digital Twin, Vol.2, pp. 1-31, 2024, DOI:10.32604/dedt.2023.044930

    Abstract The advent of technology around the globe based on the Internet of Things, Cloud Computing, Big Data, Cyber-Physical Systems, and digitalisation. This advancement introduced industry 4.0. It is challenging to measure how enterprises adopt the new technologies. Industry 4.0 introduced Digital Twins, given that no specific terms or definitions are given to Digital Twins still challenging to define or conceptualise the Digital Twins. Many academics and industries still use old technologies, naming it Digital Twins. This young technology is in danger of reaching the plateau despite the immense benefit to sectors. This paper proposes a novel and unique definition for… More >

Displaying 11-20 on page 2 of 529. Per Page