Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (404)
  • Open Access

    ARTICLE

    Evidence-Based Federated Learning for Set-Valued Classification of Industrial IoT DDos Attack Traffic

    Jiale Cheng1, Zilong Jin1,2,*

    Journal on Internet of Things, Vol.4, No.3, pp. 183-195, 2022, DOI:10.32604/jiot.2022.042054

    Abstract A novel Federated learning classifier is proposed using the Dempster-Shafer (DS) theory for the set-valued classification of industrial IoT Distributed Denial of Service (DDoS) attack traffic. The proposed classifier, referred to as the evidence-based federated learning classifier, employs convolution and pooling layers to extract high-dimensional features of Distributed Denial of Service (DDoS) traffic from the local data of private industrial clients. The characteristics obtained from the various participants are transformed into mass functions and amalgamated utilizing Dempster’s rule within the DS layer, situated on the federated server. Lastly, the set value classification task of attack mode is executed in the… More >

  • Open Access

    ARTICLE

    A Detailed Study on IoT Platform for ECG Monitoring Using Transfer Learning

    Md Saidul Islam*

    Journal on Internet of Things, Vol.4, No.3, pp. 127-140, 2022, DOI:10.32604/jiot.2022.037489

    Abstract Internet of Things (IoT) technologies used in health have the potential to address systemic difficulties by offering tools for cost reduction while improving diagnostic and treatment efficiency. Numerous works on this subject focus on clarifying the constructs and interfaces between various components of an IoT platform, such as knowledge generation via smart sensors collecting biosignals from the human body and processing them via data mining and, in recent times, deep neural networks offered to host on cloud computing architecture. These approaches are intended to assist healthcare professionals in their daily activities. In this comparative research, we discuss the construction of… More >

  • Open Access

    ARTICLE

    Blockchain and IIoT Enabled Solution for Social Distancing and Isolation Management to Prevent Pandemics

    Muhammad Saad1, Maaz Bin Ahmad1,*, Muhammad Asif2, Muhammad Khalid Khan1, Toqeer Mahmood3, Elsayed Tag Eldin4,*, Hala Abdel Hameed5,6

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 687-709, 2023, DOI:10.32604/cmc.2023.038335

    Abstract Pandemics have always been a nightmare for humanity, especially in developing countries. Forced lockdowns are considered one of the effective ways to deal with spreading such pandemics. Still, developing countries cannot afford such solutions because these may severely damage the country’s economy. Therefore, this study presents the proactive technological mechanisms for business organizations to run their standard business processes during pandemic-like situations smoothly. The novelty of this study is to provide a state-of-the-art solution to prevent pandemics using industrial internet of things (IIoT) and blockchain-enabled technologies. Compared to existing studies, the immutable and tamper-proof contact tracing and quarantine management solution… More >

  • Open Access

    ARTICLE

    A Double-Compensation-Based Federated Learning Scheme for Data Privacy Protection in a Social IoT Scenario

    Junqi Guo1,2, Qingyun Xiong1,*, Minghui Yang1, Ziyun Zhao1

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 827-848, 2023, DOI:10.32604/cmc.2023.036450

    Abstract Nowadays, smart wearable devices are used widely in the Social Internet of Things (IoT), which record human physiological data in real time. To protect the data privacy of smart devices, researchers pay more attention to federated learning. Although the data leakage problem is somewhat solved, a new challenge has emerged. Asynchronous federated learning shortens the convergence time, while it has time delay and data heterogeneity problems. Both of the two problems harm the accuracy. To overcome these issues, we propose an asynchronous federated learning scheme based on double compensation to solve the problem of time delay and data heterogeneity problems.… More >

  • Open Access

    ARTICLE

    Hidden Hierarchy Based on Cipher-Text Attribute Encryption for IoT Data Privacy in Cloud

    Zaid Abdulsalam Ibrahim1,*, Muhammad Ilyas2

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 939-956, 2023, DOI:10.32604/cmc.2023.035798

    Abstract Most research works nowadays deal with real-time Internet of Things (IoT) data. However, with exponential data volume increases, organizations need help storing such humongous amounts of IoT data in cloud storage systems. Moreover, such systems create security issues while efficiently using IoT and Cloud Computing technologies. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has the potential to make IoT data more secure and reliable in various cloud storage services. Cloud-assisted IoTs suffer from two privacy issues: access policies (public) and super polynomial decryption times (attributed mainly to complex access structures). We have developed a CP-ABE scheme in alignment with a Hidden Hierarchy Ciphertext-Policy… More >

  • Open Access

    ARTICLE

    Towards Sustainable Agricultural Systems: A Lightweight Deep Learning Model for Plant Disease Detection

    Sana Parez1, Naqqash Dilshad2, Turki M. Alanazi3, Jong Weon Lee1,*

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 515-536, 2023, DOI:10.32604/csse.2023.037992

    Abstract A country’s economy heavily depends on agricultural development. However, due to several plant diseases, crop growth rate and quality are highly suffered. Accurate identification of these diseases via a manual procedure is very challenging and time-consuming because of the deficiency of domain experts and low-contrast information. Therefore, the agricultural management system is searching for an automatic early disease detection technique. To this end, an efficient and lightweight Deep Learning (DL)-based framework (E-GreenNet) is proposed to overcome these problems and precisely classify the various diseases. In the end-to-end architecture, a MobileNetV3Small model is utilized as a backbone that generates refined, discriminative,… More >

  • Open Access

    ARTICLE

    Network Learning-Enabled Sensor Association for Massive Internet of Things

    Alaa Omran Almagrabi1,*, Rashid Ali2, Daniyal Alghazzawi1, Bander A. Alzahrani1, Fahad M. Alotaibi1

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 843-853, 2023, DOI:10.32604/csse.2023.037652

    Abstract The massive Internet of Things (IoT) comprises different gateways (GW) covering a given region of a massive number of connected devices with sensors. In IoT networks, transmission interference is observed when different sensor devices (SD) try to send information to a single GW. This is mitigated by allotting various channels to adjoining GWs. Furthermore, SDs are permitted to associate with any GW in a network, naturally choosing the one with a higher received signal strength indicator (RSSI), regardless of whether it is the ideal choice for network execution. Finding an appropriate GW to optimize the performance of IoT systems is… More >

  • Open Access

    ARTICLE

    A Lightweight Approach (BL-DAC) to Secure Storage Sharing in Cloud-IoT Environments

    Zakariae Dlimi*, Abdellah Ezzati, Said Ben Alla

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 79-103, 2023, DOI:10.32604/csse.2023.037099

    Abstract The growing advent of the Internet of Things (IoT) users is driving the adoption of cloud computing technologies. The integration of IoT in the cloud enables storage and computational capabilities for IoT users. However, security has been one of the main concerns of cloud-integrated IoT. Existing work attempts to address the security concerns of cloud-integrated IoT through authentication, access control, and blockchain-based methods. However, existing frameworks are somewhat limited by scalability, privacy, and centralized structures. To mitigate the existing problems, we propose a blockchain-based distributed access control method for secure storage in the IoT cloud (BL-DAC). Initially, the BL-DAC performs… More >

  • Open Access

    ARTICLE

    An Interoperability Cross-Block Chain Framework for Secure Transactions in IoT

    N. Anand Kumar1,*, A. Grace Selvarani2, P. Vivekanandan3

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1077-1090, 2023, DOI:10.32604/csse.2023.034115

    Abstract The purpose of this research is to deal with effective block chain framework for secure transactions. The rate of effective data transactions and the interoperability of the ledger are the two major obstacles involved in Blockchain and to tackle this issue, Cross-Chain based Transaction (CCT) is introduced. Traditional industries have been restructured by the introduction of Internet of Things (IoT) to become smart industries through the feature of data-driven decision-making. Still, there are a few limitations, like decentralization, security vulnerabilities, poor interoperability, as well as privacy concerns in IoTs. To overcome this limitation, Blockchain has been employed to assure a… More >

  • Open Access

    ARTICLE

    Real-Time Memory Data Optimization Mechanism of Edge IoT Agent

    Shen Guo*, Wanxing Sheng, Shuaitao Bai, Jichuan Zhang, Peng Wang

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 799-814, 2023, DOI:10.32604/iasc.2023.038330

    Abstract With the full development of disk-resident databases (DRDB) in recent years, it is widely used in business and transactional applications. In long-term use, some problems of disk databases are gradually exposed. For applications with high real-time requirements, the performance of using disk database is not satisfactory. In the context of the booming development of the Internet of things, domestic real-time databases have also gradually developed. Still, most of them only support the storage, processing, and analysis of data values with fewer data types, which can not fully meet the current industrial process control system data types, complex sources, fast update… More >

Displaying 61-70 on page 7 of 404. Per Page