Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (540)
  • Open Access

    ARTICLE

    IoT Technologies for Tackling COVID-19 in Malaysia and Worldwide: Challenges, Recommendations, and Proposed Framework

    Ali Saadon Al-Ogaili1,*, Ameer Alhasan2, Agileswari Ramasamy1, Marayati Binti Marsadek1, Tengku Juhana Tengku Hashim1, Ammar Al-Sharaa3, Mastura Binti Aadam3, Lukman Audah2

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 2141-2164, 2021, DOI:10.32604/cmc.2020.013440

    Abstract The Coronavirus (COVID-19) pandemic is considered as a global public health challenge. To contain this pandemic, different measures are being taken globally. The Internet of Things (IoT) has been represented as one of the most important schemes that has been considered to fight the spread of COVID-19 in the world, practically Malaysia. In fact, there are many sectors in Malaysia would be transformed into smart services by using IoT technologies, particularly energy, transportation, healthcare sectors. This manuscript presents a comprehensive review of the IoT technologies that are being used currently in Malaysia to accelerate the measures against COVID-19. These IoT… More >

  • Open Access

    ARTICLE

    Memetic Optimization with Cryptographic Encryption for Secure Medical Data Transmission in IoT-Based Distributed Systems

    Srinath Doss1, Jothi Paranthaman2, Suseendran Gopalakrishnan3, Akila Duraisamy3, Souvik Pal4, Balaganesh Duraisamy5, Chung Le Van6,*, Dac-Nhuong Le7

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1577-1594, 2021, DOI:10.32604/cmc.2020.012379

    Abstract In the healthcare system, the Internet of Things (IoT) based distributed systems play a vital role in transferring the medical-related documents and information among the organizations to reduce the replication in medical tests. This datum is sensitive, and hence security is a must in transforming the sensational contents. In this paper, an Evolutionary Algorithm, namely the Memetic Algorithm is used for encrypting the text messages. The encrypted information is then inserted into the medical images using Discrete Wavelet Transform 1 level and 2 levels. The reverse method of the Memetic Algorithm is implemented when extracting a hidden message from the… More >

  • Open Access

    ARTICLE

    Green Energy Development System under the Background of Environmental Sustainability

    Qin Liu*, Ruliang Zhang

    Energy Engineering, Vol.118, No.1, pp. 173-187, 2021, DOI:10.32604/EE.2020.012788

    Abstract With the continuous advancement of economic globalization, energy demand is expanding and energy consumption is excessive, which leads to energy shortage. Unreasonable energy use also brings great challenges to the environment and affects the balance of the ecosystem seriously. The rise of the third industrial revolution has injected new vitality into energy system. The construction of energy Internet system, which integrates Internet technology and energy technology, has become a new energy system of sustainable development. It has put forward the reform scheme for the mismatch of energy demand points and environmental pollution. The deepening of sustainable development strategy accelerates the… More >

  • Open Access

    ARTICLE

    Emergency Prioritized and Congestion Handling Protocol for Medical Internet of Things

    Sabeen Tahir*, Sheikh Tahir Bakhsh, Rayed AlGhamdi

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 733-749, 2021, DOI:10.32604/cmc.2020.013261

    Abstract Medical Internet of Things (MIoTs) is a collection of small and energyefficient wireless sensor devices that monitor the patient’s body. The healthcare networks transmit continuous data monitoring for the patients to survive them independently. There are many improvements in MIoTs, but still, there are critical issues that might affect the Quality of Service (QoS) of a network. Congestion handling is one of the critical factors that directly affect the QoS of the network. The congestion in MIoT can cause more energy consumption, delay, and important data loss. If a patient has an emergency, then the life-critical signals must transmit with… More >

  • Open Access

    ARTICLE

    Intelligent Tunicate Swarm-Optimization-Algorithm-Based Lightweight Security Mechanism in Internet of Health Things

    Gia Nhu Nguyen1,2, Nin Ho Le Viet1,2, Gyanendra Prasad Joshi3, Bhanu Shrestha4,*

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 551-562, 2021, DOI:10.32604/cmc.2020.012441

    Abstract Fog computing in the Internet of Health Things (IoHT) is promising owing to the increasing need for energy- and latency-optimized health sector provisioning. Additionally, clinical data (particularly, medical image data) are a delicate, highly protected resource that should be utilized in an effective and responsible manner to fulfil consumer needs. Herein, we propose an energy-effi- cient fog-based IoHT with a tunicate swarm-optimization-(TSO)-based lightweight Simon cipher to enhance the energy efficiency at the fog layer and the security of data stored at the cloud server. The proposed Simon cipher uses the TSO algorithm to select the optimal keys that will minimize… More >

  • Open Access

    ARTICLE

    Traffic Queuing Management in the Internet of Things: An Optimized RED Algorithm Based Approach

    Abdul Waheed1,2,*, Naila Habib Khan3, Mahdi Zareei4, Shahab Ul Islam5, Latif Jan5,6, Arif Iqbal Umar1, Ehab Mahmoud Mohamed7,8

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 359-372, 2021, DOI:10.32604/cmc.2020.012196

    Abstract Congestion control is one of the main obstacles in cyberspace traffic. Overcrowding in internet traffic may cause several problems; such as high packet hold-up, high packet dropping, and low packet output. In the course of data transmission for various applications in the Internet of things, such problems are usually generated relative to the input. To tackle such problems, this paper presents an analytical model using an optimized Random Early Detection (RED) algorithm-based approach for internet traffic management. The validity of the proposed model is checked through extensive simulation-based experiments. An analysis is observed for different functions on internet traffic. Four… More >

  • Open Access

    ARTICLE

    A Hybrid Intelligent Approach for Content Authentication and Tampering Detection of Arabic Text Transmitted via Internet

    Fahd N. Al-Wesabi1,2,*

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 195-211, 2021, DOI:10.32604/cmc.2020.012088

    Abstract In this paper, a hybrid intelligent text zero-watermarking approach has been proposed by integrating text zero-watermarking and hidden Markov model as natural language processing techniques for the content authentication and tampering detection of Arabic text contents. The proposed approach known as Second order of Alphanumeric Mechanism of Markov model and Zero-Watermarking Approach (SAMMZWA). Second level order of alphanumeric mechanism based on hidden Markov model is integrated with text zero-watermarking techniques to improve the overall performance and tampering detection accuracy of the proposed approach. The SAMMZWA approach embeds and detects the watermark logically without altering the original text document. The extracted… More >

  • Open Access

    ARTICLE

    Combining Trend-Based Loss with Neural Network for Air Quality Forecasting in Internet of Things

    Weiwen Kong1, Baowei Wang1,2,3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.125, No.2, pp. 849-863, 2020, DOI:10.32604/cmes.2020.012818

    Abstract Internet of Things (IoT) is a network that connects things in a special union. It embeds a physical entity through an intelligent perception system to obtain information about the component at any time. It connects various objects. IoT has the ability of information transmission, information perception,andinformationprocessing.Theairqualityforecastinghasalways been an urgent problem, which affects people’s quality of life seriously. So far, many air quality prediction algorithms have been proposed, which can be mainly classifed into two categories. One is regression-based prediction, the other is deep learning-based prediction. Regression-based prediction is aimed to make use of the classical regression algorithm and the various… More >

  • Open Access

    ARTICLE

    Performance Analysis of Intelligent CR-NOMA Model for Industrial IoT Communications

    Yinghua Zhang1,2, Jian Liu1, Yunfeng Peng1, Yanfang Dong2, Changming Zhao3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.125, No.1, pp. 239-257, 2020, DOI:10.32604/cmes.2020.010778

    Abstract Aiming for ultra-reliable low-latency wireless communications required in industrial internet of things (IIoT) applications, this paper studies a simple cognitive radio non-orthogonal multiple access (CR-NOMA) downlink system. This system consists of two secondary users (SUs) dynamically interfered by the primary user (PU), and its performance is characterized by the outage probability of the SU communications. This outage probability is calculated under two conditions where, a) the transmission of PU starts after the channel state information (CSI) is acquired, so the base station (BS) is oblivious of the interference, and b) when the BS is aware of the PU interference, and… More >

  • Open Access

    ARTICLE

    Research on Intelligent Mobile Commerce Transaction Security Mechanisms Based on Mobile Agent

    Weijin Jiang1, 2, 3, Wei Liu2, *, Haolong Xia1, Yuhui Xu2, Dongbo Cao1, Guo Liang4

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2543-2555, 2020, DOI:10.32604/cmc.2020.011454

    Abstract In networked mobile commerce network transactions, trust is the prerequisite and key to a smooth transaction. The measurement of trust between entities involves factors such as transaction amount, transaction time, personal income of consumer entities and their risk attitude towards trust, etc., so it is difficult to accurately calculate quantitatively. In order to find out the essential characteristics of this trust relationship, based on the research background of mobile commerce in the mobile network environment, a dynamic trust mechanism is proposed through the research of trust in the mobile network environment, trust influencing factors and trust mechanism. The calculation model… More >

Displaying 491-500 on page 50 of 540. Per Page