Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (540)
  • Open Access

    ARTICLE

    Reliability Analysis of Correlated Competitive and Dependent Components Considering Random Isolation Times

    Shuo Cai1, Tingyu Luo1, Fei Yu1,*, Pradip Kumar Sharma2, Weizheng Wang1, Lairong Yin3

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 2763-2777, 2023, DOI:10.32604/cmc.2023.037825

    Abstract In the Internet of Things (IoT) system, relay communication is widely used to solve the problem of energy loss in long-distance transmission and improve transmission efficiency. In Body Sensor Network (BSN) systems, biosensors communicate with receiving devices through relay nodes to improve their limited energy efficiency. When the relay node fails, the biosensor can communicate directly with the receiving device by releasing more transmitting power. However, if the remaining battery power of the biosensor is insufficient to enable it to communicate directly with the receiving device, the biosensor will be isolated by the system. Therefore, a new combinatorial analysis method… More >

  • Open Access

    ARTICLE

    Le projet Sav-AQ : étude des freins et facteurs à l’utilisation d’un site internet dédié aux patientes atteintes de cancer du sein, l’exemple de la Nouvelle-Aquitaine

    Valérie Berger1,2,*, Hélène Hoarau1,2, Florence Saillour3,4

    Psycho-Oncologie, Vol.17, No.3, pp. 159-166, 2023, DOI:10.32604/po.2023.044727

    Abstract Le développement des plateformes numériques dans le domaine de la santé transforme les interactions soignants-soignés et la diffusion des savoirs. S’informer par le biais d’internet est devenu une habitude pour de nombreux patients et doit être pris en compte par les soignants. Ainsi, comprendre les usages des outils numériques par les patients est un enjeu de santé publique. L’étude Sav-AQ vise à comprendre les usages par des femmes atteintes d’un cancer du sein et le rôle des professionnels de santé. Il s’agit d’une étude mixte de faisabilité exploratoire, de type avant-après l’intégration dans le parcours de soins du portail «… More >

  • Open Access

    ARTICLE

    An Efficient and Provably Secure SM2 Key-Insulated Signature Scheme for Industrial Internet of Things

    Senshan Ouyang1,2, Xiang Liu2, Lei Liu2, Shangchao Wang2, Baichuan Shao3, Yang Zhao3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 903-915, 2024, DOI:10.32604/cmes.2023.028895

    Abstract With the continuous expansion of the Industrial Internet of Things (IIoT), more and more organisations are placing large amounts of data in the cloud to reduce overheads. However, the channel between cloud servers and smart equipment is not trustworthy, so the issue of data authenticity needs to be addressed. The SM2 digital signature algorithm can provide an authentication mechanism for data to solve such problems. Unfortunately, it still suffers from the problem of key exposure. In order to address this concern, this study first introduces a key-insulated scheme, SM2-KI-SIGN, based on the SM2 algorithm. This scheme boasts strong key insulation… More >

  • Open Access

    ARTICLE

    A Novel IoT Architecture, Assessment of Threats and Their Classification with Machine Learning Solutions

    Oliva Debnath1, Saptarshi Debnath1, Sreyashi Karmakar2, MD Tausif Mallick3, Himadri Nath Saha4,*

    Journal on Internet of Things, Vol.5, pp. 13-43, 2023, DOI:10.32604/jiot.2023.039391

    Abstract The Internet of Things (IoT) will significantly impact our social and economic lives in the near future. Many Internet of Things (IoT) applications aim to automate multiple tasks so inactive physical objects can behave independently of others. IoT devices, however, are also vulnerable, mostly because they lack the essential built-in security to thwart attackers. It is essential to perform the necessary adjustments in the structure of the IoT systems in order to create an end-to-end secure IoT environment. As a result, the IoT designs that are now in use do not completely support all of the advancements that have been… More >

  • Open Access

    ARTICLE

    Wake-Up Security: Effective Security Improvement Mechanism for Low Power Internet of Things

    Sun-Woo Yun1, Na-Eun Park1, Il-Gu Lee1,2,*

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2897-2917, 2023, DOI:10.32604/iasc.2023.039940

    Abstract As time and space constraints decrease due to the development of wireless communication network technology, the scale and scope of cyberattacks targeting the Internet of Things (IoT) are increasing. However, it is difficult to apply high-performance security modules to the IoT owing to the limited battery, memory capacity, and data transmission performance depending on the size of the device. Conventional research has mainly reduced power consumption by lightening encryption algorithms. However, it is difficult to defend large-scale information systems and networks against advanced and intelligent attacks because of the problem of deteriorating security performance. In this study, we propose wake-up… More >

  • Open Access

    ARTICLE

    An IoT-Based Aquaculture Monitoring System Using Firebase

    Wen-Tsai Sung1, Indra Griha Tofik Isa1,2, Sung-Jung Hsiao3,*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2179-2200, 2023, DOI:10.32604/cmc.2023.041022

    Abstract Indonesia is a producer in the fisheries sector, with production reaching 14.8 million tons in 2022. The production potential of the fisheries sector can be optimally optimized through aquaculture management. One of the most important issues in aquaculture management is how to efficiently control the fish pond water conditions. IoT technology can be applied to support a fish pond aquaculture monitoring system, especially for catfish species (Siluriformes), in real-time and remotely. One of the technologies that can provide this convenience is the IoT. The problem of this study is how to integrate IoT devices with Firebase’s cloud data system to… More >

  • Open Access

    ARTICLE

    AID4I: An Intrusion Detection Framework for Industrial Internet of Things Using Automated Machine Learning

    Anıl Sezgin1,2,*, Aytuğ Boyacı3

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2121-2143, 2023, DOI:10.32604/cmc.2023.040287

    Abstract By identifying and responding to any malicious behavior that could endanger the system, the Intrusion Detection System (IDS) is crucial for preserving the security of the Industrial Internet of Things (IIoT) network. The benefit of anomaly-based IDS is that they are able to recognize zero-day attacks due to the fact that they do not rely on a signature database to identify abnormal activity. In order to improve control over datasets and the process, this study proposes using an automated machine learning (AutoML) technique to automate the machine learning processes for IDS. Our ground-breaking architecture, known as AID4I, makes use of… More >

  • Open Access

    ARTICLE

    Machine Learning-Enabled Communication Approach for the Internet of Medical Things

    Rahim Khan1,3, Abdullah Ghani1, Samia Allaoua Chelloug2,*, Mohammed Amin4, Aamir Saeed5, Jason Teo1

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1569-1584, 2023, DOI:10.32604/cmc.2023.039859

    Abstract The Internet of Medical Things (IoMT) is mainly concerned with the efficient utilisation of wearable devices in the healthcare domain to manage various processes automatically, whereas machine learning approaches enable these smart systems to make informed decisions. Generally, broadcasting is used for the transmission of frames, whereas congestion, energy efficiency, and excessive load are among the common issues associated with existing approaches. In this paper, a machine learning-enabled shortest path identification scheme is presented to ensure reliable transmission of frames, especially with the minimum possible communication overheads in the IoMT network. For this purpose, the proposed scheme utilises a well-known… More >

  • Open Access

    ARTICLE

    A Deep CNN-LSTM-Based Feature Extraction for Cyber-Physical System Monitoring

    Alaa Omran Almagrabi*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2079-2093, 2023, DOI:10.32604/cmc.2023.039683

    Abstract A potential concept that could be effective for multiple applications is a “cyber-physical system” (CPS). The Internet of Things (IoT) has evolved as a research area, presenting new challenges in obtaining valuable data through environmental monitoring. The existing work solely focuses on classifying the audio system of CPS without utilizing feature extraction. This study employs a deep learning method, CNN-LSTM, and two-way feature extraction to classify audio systems within CPS. The primary objective of this system, which is built upon a convolutional neural network (CNN) with Long Short Term Memory (LSTM), is to analyze the vocalization patterns of two different… More >

  • Open Access

    ARTICLE

    Developed Fall Detection of Elderly Patients in Internet of Healthcare Things

    Omar Reyad1,2, Hazem Ibrahim Shehata1,3, Mohamed Esmail Karar1,4,*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1689-1700, 2023, DOI:10.32604/cmc.2023.039084

    Abstract Falling is among the most harmful events older adults may encounter. With the continuous growth of the aging population in many societies, developing effective fall detection mechanisms empowered by machine learning technologies and easily integrable with existing healthcare systems becomes essential. This paper presents a new healthcare Internet of Health Things (IoHT) architecture built around an ensemble machine learning-based fall detection system (FDS) for older people. Compared to deep neural networks, the ensemble multi-stage random forest model allows the extraction of an optimal subset of fall detection features with minimal hyperparameters. The number of cascaded random forest stages is automatically… More >

Displaying 61-70 on page 7 of 540. Per Page