Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (509)
  • Open Access

    REVIEW

    A Review about Wireless Sensor Networks and the Internet of Things

    Amarjit Singh*

    Journal on Internet of Things, Vol.4, No.2, pp. 69-73, 2022, DOI:10.32604/jiot.2022.026170 - 28 March 2023

    Abstract Wireless sensor networks (WSNs) are created and affect our daily lives. You can find applications in various fields such as health, accident, life, manufacturing, production management, network management and many other fields. WSN now connects to the Internet of Things, connects the sensor to the Internet, and then uses it for collaboration and collaboration. However, when WSN is part of the internet we need to be able to study and analyze related terms. In this article, we’re going to look at different ways to get WSN online and identify the challenges that address in future More >

  • Open Access

    ARTICLE

    A Dynamic Management Scheme for Internet of Things (IoT) Environments: Simulation and Performance Evaluation

    Omar Said*

    CMES-Computer Modeling in Engineering & Sciences, Vol.133, No.3, pp. 673-695, 2022, DOI:10.32604/cmes.2022.021160 - 03 August 2022

    Abstract In recent years, the Internet of Things (IoT) technology has been considered one of the most attractive fields for researchers due to its aspirations and implications for society and life as a whole. The IoT environment contains vast numbers of devices, equipment, and heterogeneous users who generate massive amounts of data. Furthermore, things’ entry into and exit from IoT systems occur dynamically, changing the topology and content of IoT networks very quickly. Therefore, managing IoT environments is among the most pressing challenges. This paper proposes an adaptive and dynamic scheme for managing IoT environments is… More >

  • Open Access

    REVIEW

    6G-Enabled Internet of Things: Vision, Techniques, and Open Issues

    Mehdi Hosseinzadeh1, Atefeh Hemmati2, Amir Masoud Rahmani3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.133, No.3, pp. 509-556, 2022, DOI:10.32604/cmes.2022.021094 - 03 August 2022

    Abstract There are changes in the development of wireless technology systems every decade. 6G (sixth generation) wireless networks improve on previous generations by increasing dependability, accelerating networks, increasing available bandwidth, decreasing latency, and increasing data transmission speed to standardize communication signals. The purpose of this article is to comprehend the current directions in 6G studies and their relationship to the Internet of Things (IoT). Also, this paper discusses the impacts of 6G on IoT, critical requirements and trends for 6G-enabled IoT, new service classes of 6G and IoT technologies, and current 6G-enabled IoT studies selected by… More >

  • Open Access

    ARTICLE

    Blockchain Assisted Intrusion Detection System Using Differential Flower Pollination Model

    Mohammed Altaf Ahmed1, Sara A Althubiti2, Dronamraju Nageswara Rao3, E. Laxmi Lydia4, Woong Cho5, Gyanendra Prasad Joshi6, Sung Won Kim7,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 4695-4711, 2022, DOI:10.32604/cmc.2022.032083 - 28 July 2022

    Abstract Cyberattacks are developing gradually sophisticated, requiring effective intrusion detection systems (IDSs) for monitoring computer resources and creating reports on anomalous or suspicious actions. With the popularity of Internet of Things (IoT) technology, the security of IoT networks is developing a vital problem. Because of the huge number and varied kinds of IoT devices, it can be challenging task for protecting the IoT framework utilizing a typical IDS. The typical IDSs have their restrictions once executed to IoT networks because of resource constraints and complexity. Therefore, this paper presents a new Blockchain Assisted Intrusion Detection System… More >

  • Open Access

    ARTICLE

    Artificial Intelligence Based Threat Detection in Industrial Internet of Things Environment

    Fahad F. Alruwaili*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5809-5824, 2022, DOI:10.32604/cmc.2022.031613 - 28 July 2022

    Abstract Internet of Things (IoT) is one of the hottest research topics in recent years, thanks to its dynamic working mechanism that integrates physical and digital world into a single system. IoT technology, applied in industries, is termed as Industrial IoT (IIoT). IIoT has been found to be highly susceptible to attacks from adversaries, based on the difficulties observed in IIoT and its increased dependency upon internet and communication network. Intentional or accidental attacks on these approaches result in catastrophic effects like power outage, denial of vital health services, disruption to civil service, etc., Thus, there… More >

  • Open Access

    ARTICLE

    Mutated Leader Sine-Cosine Algorithm for Secure Smart IoT-Blockchain of Industry 4.0

    Mustufa Haider Abidi*, Hisham Alkhalefah, Muneer Khan Mohammed

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5367-5383, 2022, DOI:10.32604/cmc.2022.030018 - 28 July 2022

    Abstract In modern scenarios, Industry 4.0 entails invention with various advanced technology, and blockchain is one among them. Blockchains are incorporated to enhance privacy, data transparency as well as security for both large and small scale enterprises. Industry 4.0 is considered as a new synthesis fabrication technique that permits the manufacturers to attain their target effectively. However, because numerous devices and machines are involved, data security and privacy are always concerns. To achieve intelligence in Industry 4.0, blockchain technologies can overcome potential cybersecurity constraints. Nowadays, the blockchain and internet of things (IoT) are gaining more attention… More >

  • Open Access

    ARTICLE

    NOMA-Based Cooperative Relaying Transmission for the Industrial Internet of Things

    Yinghua Zhang1,*, Rui Cao1, Lixin Tian1, Rong Dai2, Zhennan Cao2, Jim Feng3

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6513-6534, 2022, DOI:10.32604/cmc.2022.029467 - 28 July 2022

    Abstract With the continuous maturity of the fifth generation (5G) communications, industrial Internet of Things (IIoT) technology has been widely applied in fields such as smart factories. In smart factories, 5G-based production line monitoring can improve production efficiency and reduce costs, but there are problems with limited monitoring coverage and insufficient wireless spectrum resources, which restricts the application of IIoT in the construction of smart factories. In response to these problems, we propose a hybrid spectrum access mechanism based on Non-Orthogonal Multiple Access (NOMA) cooperative relaying transmission to improve the monitoring coverage and spectrum efficiency. As… More >

  • Open Access

    ARTICLE

    Multi-Band Bandpass Filter Using Novel Topology for Next-Generation IoT Wireless Systems

    Muhammad Faisal*, Sohail Khalid

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 4819-4832, 2022, DOI:10.32604/cmc.2022.029049 - 28 July 2022

    Abstract The design of single- and quad-band Bandpass Filter (BPF) topology has been presented in this paper for next-generation Internet of Things (IoT) devices. The main topology is constructed using the Split Ring Resonator (SRR), separated by the Anti-Parallel Coupled Line Structure (APCLS). A detailed analysis of APCLS has been presented, which is further used to construct the single- and quad-band BPF. The single-band BPF design consists of SRR loaded with APCLS. The developed single-band BPF displays a dual-mode response with a center frequency of 2.65 GHz and a measured fractional bandwidth of 17.17%. Moreover, a More >

  • Open Access

    ARTICLE

    Efficient UAV-Based MEC Using GPU-Based PSO and Voronoi Diagrams

    Mohamed H. Mousa1,2,*, Mohamed K. Hussein2

    CMES-Computer Modeling in Engineering & Sciences, Vol.133, No.2, pp. 413-434, 2022, DOI:10.32604/cmes.2022.020639 - 21 July 2022

    Abstract Mobile-Edge Computing (MEC) displaces cloud services as closely as possible to the end user. This enables the edge servers to execute the offloaded tasks that are requested by the users, which in turn decreases the energy consumption and the turnaround time delay. However, as a result of a hostile environment or in catastrophic zones with no network, it could be difficult to deploy such edge servers. Unmanned Aerial Vehicles (UAVs) can be employed in such scenarios. The edge servers mounted on these UAVs assist with task offloading. For the majority of IoT applications, the execution… More >

  • Open Access

    ARTICLE

    Intelligent Resource Allocations for Software-Defined Mission-Critical IoT Services

    Chaebeen Nam1, Sa Math1, Prohim Tam1, Seokhoon Kim1,2,*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 4087-4102, 2022, DOI:10.32604/cmc.2022.030575 - 16 June 2022

    Abstract Heterogeneous Internet of Things (IoT) applications generate a diversity of novelty applications and services in next-generation networks (NGN), which is essential to guarantee end-to-end (E2E) communication resources for both control plane (CP) and data plane (DP). Likewise, the heterogeneous 5th generation (5G) communication applications, including Mobile Broadband Communications (MBBC), massive Machine-Type Commutation (mMTC), and ultra-reliable low latency communications (URLLC), obligate to perform intelligent Quality-of-Service (QoS) Class Identifier (QCI), while the CP entities will be suffered from the complicated massive HIOT applications. Moreover, the existing management and orchestration (MANO) models are inappropriate for resource utilization and… More >

Displaying 291-300 on page 30 of 509. Per Page