Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (399)
  • Open Access

    ARTICLE

    Realization of Internet of Things Smart Appliances

    Jia‐Shing Sheua, I‐Chen Chenb, Yi‐Syong Liaoa

    Intelligent Automation & Soft Computing, Vol.25, No.2, pp. 395-404, 2019, DOI:10.31209/2019.100000101

    Abstract This study proposed a household energy state monitoring system (HESMS) and a household energy load monitoring system (HELMS) for monitoring smart appliances. The HESMS applies reinforcement learning to receive changes in the external environment and the state of an electrical appliance, determines if the electrical appliance should be turned on, and controls the signals sent to the HELMS according to these decisions. The HELMS implements an ON/OFF control mechanism for household appliances according to the control signals and the power consumption state. The proposed systems are based on the wireless communication network and can monitor household appliances’ energy usage, control… More >

  • Open Access

    ARTICLE

    Trust Provision in the Internet of Things Using Transversal Blockchain Networks

    Borja Bordela, Ramon Alcarriab, Diego Martína, Álvaro Sánchez-Picota

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 155-170, 2019, DOI:10.31209/2018.100000052

    Abstract The Internet-of-Things (IoT) paradigm faces new and genuine challenges and problems associated, mainly, with the ubiquitous access to the Internet, the huge number of devices involved and the heterogeneity of the components making up this new global network. In this context, protecting these systems against cyberattacks and cybercrimes has turn into a basic issue. In relation to this topic, most proposed solutions in the literature are focused on security; however other aspects have to be considered (such as privacy or trust). Therefore, in this paper we define a theoretical framework for trust in IoT scenarios, including a mathematical formalization and… More >

  • Open Access

    ARTICLE

    A Distributed Approach of Big Data Mining for Financial Fraud Detection in a Supply Chain

    Hangjun Zhou1, *, Guang Sun1, 2, Sha Fu1, Xiaoping Fan1, Wangdong Jiang1, Shuting Hu1, Lingjiao Li1

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1091-1105, 2020, DOI:10.32604/cmc.2020.09834

    Abstract Supply Chain Finance (SCF) is important for improving the effectiveness of supply chain capital operations and reducing the overall management cost of a supply chain. In recent years, with the deep integration of supply chain and Internet, Big Data, Artificial Intelligence, Internet of Things, Blockchain, etc., the efficiency of supply chain financial services can be greatly promoted through building more customized risk pricing models and conducting more rigorous investment decision-making processes. However, with the rapid development of new technologies, the SCF data has been massively increased and new financial fraud behaviors or patterns are becoming more covertly scattered among normal… More >

  • Open Access

    ARTICLE

    Anomaly IoT Node Detection Based on Local Outlier Factor and Time Series

    Fang Wang1, *, Zhe Wei1, Xu Zuo2

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1063-1073, 2020, DOI:10.32604/cmc.2020.09774

    Abstract The heterogeneous nodes in the Internet of Things (IoT) are relatively weak in the computing power and storage capacity. Therefore, traditional algorithms of network security are not suitable for the IoT. Once these nodes alternate between normal behavior and anomaly behavior, it is difficult to identify and isolate them by the network system in a short time, thus the data transmission accuracy and the integrity of the network function will be affected negatively. Based on the characteristics of IoT, a lightweight local outlier factor detection method is used for node detection. In order to further determine whether the nodes are… More >

  • Open Access

    ARTICLE

    Energy Efficiency in Internet of Things: An Overview

    Wuxiong Zhang1, 2, Weidong Fang1, 2, *, Qianqian Zhao1, 2, Xiaohong Ji3, Guoqing Jia3

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 787-811, 2020, DOI:10.32604/cmc.2020.07620

    Abstract Energy efficiency is very important for the Internet of Things (IoT), especially for front-end sensed terminal or node. It not only embodies the node’s life, but also reflects the lifetime of the network. Meanwhile, it is also a key indicator of green communications. Unfortunately, there is no article on systematic analysis and review for energy efficiency evaluation in IoT. In this paper, we systemically analyze the architecture of IoT, and point out its energy distribution, Furthermore, we summarized the energy consumption model in IoT, analyzed the pros and cons of improving energy efficiency, presented a state of the art the… More >

  • Open Access

    ARTICLE

    QoS-Aware and Resource-Efficient Dynamic Slicing Mechanism for Internet of Things

    Wenchen He1,*, Shaoyong Guo1, Yun Liang2, Rui Ma3, Xuesong Qiu1, Lei Shi4

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1345-1364, 2019, DOI:10.32604/cmc.2019.06669

    Abstract With the popularization of terminal devices and services in Internet of things (IoT), it will be a challenge to design a network resource allocation method meeting various QoS requirements and effectively using substrate resources. In this paper, a dynamic network slicing mechanism including virtual network (VN) mapping and VN reconfiguration is proposed to provide network slices for services. Firstly, a service priority model is defined to create queue for resource allocation. Then a slice including Virtual Network Function (VNF) placement and routing with optimal cost is generated by VN mapping. Next, considering temporal variations of service resource requirements, the size… More >

  • Open Access

    ARTICLE

    CPAC: Energy-Efficient Algorithm for IoT Sensor Networks Based on Enhanced Hybrid Intelligent Swarm

    Qi Wang1,*, Wei Liu1, Hualong Yu1, Shang Zheng1, Shang Gao1, Fabrizio Granelli2

    CMES-Computer Modeling in Engineering & Sciences, Vol.121, No.1, pp. 83-103, 2019, DOI:10.32604/cmes.2019.06897

    Abstract The wireless sensor network (WSN) is widely employed in the application scenarios of the Internet of Things (IoT) in recent years. Extending the lifetime of the entire system had become a significant challenge due to the energy-constrained fundamental limits of sensor nodes on the perceptual layer of IoT. The clustering routing structures are currently the most popular solution, which can effectively reduce the energy consumption of the entire network and improve its reliability. This paper introduces an enhanced hybrid intelligential algorithm based on particle swarm optimization (PSO) and ant colony optimization (ACO) method. The enhanced PSO is deployed to select… More >

  • Open Access

    ARTICLE

    A New Anti-Quantum Proxy Blind Signature for Blockchain-Enabled Internet of Things

    Chaoyang Li1,2,3, Gang Xu2, Yuling Chen1,*, Haseeb Ahmad4, Jian Li3

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 711-726, 2019, DOI:10.32604/cmc.2019.06279

    Abstract Blockchain technology has become a research hotspot in recent years with the prominent characteristics as public, distributed and decentration. And blockchain-enabled internet of things (BIoT) has a tendency to make a revolutionary change for the internet of things (IoT) which requires distributed trustless consensus. However, the scalability and security issues become particularly important with the dramatically increasing number of IoT devices. Especially, with the development of quantum computing, many extant cryptographic algorithms applied in blockchain or BIoT systems are vulnerable to the quantum attacks. In this paper, an anti-quantum proxy blind signature scheme based on the lattice cryptography has been… More >

  • Open Access

    ARTICLE

    IoT Based Approach in a Power System Network for Optimizing Distributed Generation Parameters

    P. Shanmugapriya1, J. Baskaran2, C. Nayanatara1,*, D. P. Kothari3

    CMES-Computer Modeling in Engineering & Sciences, Vol.119, No.3, pp. 541-558, 2019, DOI:10.32604/cmes.2019.04074

    Abstract The objective of this paper is to provide a robust Virtual Power Plant (VPP) network collaborated with Internet of Things (IoT) which uses a conceptual model to integrate each device in the grid. Based on the functionality all the devices which are purely distributed within the grid are networked initially from residential units to substations and up to service data and demand centres. To ensure the trapping of the available power and the efficient transfer of Distributed Generation (DG) power to the grid Distribution Active Control (DAC) strategy is used. Synchronized optimization of DG parameter which includes DG size, location… More >

  • Open Access

    ARTICLE

    A Survey on Cryptographic Security and Information Hiding Technology for Cloud or Fog-Based IoT System

    Liang Bai1, Yuzhen Liu1, Xiaoliang Wang1,*, Nick Patterson2, F. Jiang2

    Journal of Information Hiding and Privacy Protection, Vol.1, No.1, pp. 1-10, 2019, DOI:10.32604/jihpp.2019.06043

    Abstract Internet of Things (IoT) is an emerging paradigm involving intelligent sensor networks that incorporates embedded technology for collecting data, communicating with external environments. Recently, cloud computing together with fog computing has become an important research area of the Internet of Things because of big data processing capabilities. It is a promising technology that utilizes cloud or fog computing / architecture to improve sensor computing, storage, and communication capabilities. However, recently it has been shown that this computing/architecture may be vulnerable to various attacks because of the openness nature of the wireless network. Therefore, it becomes more and more important to… More >

Displaying 381-390 on page 39 of 399. Per Page