Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (404)
  • Open Access

    ARTICLE

    Modified Metaheuristics with Weighted Majority Voting Ensemble Deep Learning Model for Intrusion Detection System

    Mahmoud Ragab1,2,*, Sultanah M. Alshammari2,3, Abdullah S. Al-Malaise Al-Ghamdi2,4

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2497-2512, 2023, DOI:10.32604/csse.2023.041446

    Abstract The Internet of Things (IoT) system has confronted dramatic growth in high dimensionality and data traffic. The system named intrusion detection systems (IDS) is broadly utilized for the enhancement of security posture in an IT infrastructure. An IDS is a practical and suitable method for assuring network security and identifying attacks by protecting it from intrusive hackers. Nowadays, machine learning (ML)-related techniques were used for detecting intrusion in IoTs IDSs. But, the IoT IDS mechanism faces significant challenges because of physical and functional diversity. Such IoT features use every attribute and feature for IDS self-protection unrealistic and difficult. This study… More >

  • Open Access

    ARTICLE

    Edge Cloud Selection in Mobile Edge Computing (MEC)-Aided Applications for Industrial Internet of Things (IIoT) Services

    Dae-Young Kim1, SoYeon Lee2, MinSeung Kim2, Seokhoon Kim1,*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2049-2060, 2023, DOI:10.32604/csse.2023.040473

    Abstract In many IIoT architectures, various devices connect to the edge cloud via gateway systems. For data processing, numerous data are delivered to the edge cloud. Delivering data to an appropriate edge cloud is critical to improve IIoT service efficiency. There are two types of costs for this kind of IoT network: a communication cost and a computing cost. For service efficiency, the communication cost of data transmission should be minimized, and the computing cost in the edge cloud should be also minimized. Therefore, in this paper, the communication cost for data transmission is defined as the delay factor, and the… More >

  • Open Access

    ARTICLE

    A Health Monitoring System Using IoT-Based Android Mobile Application

    Madallah Alruwaili1,*, Muhammad Hameed Siddiqi1, Kamran Farid2, Mohammad Azad1, Saad Alanazi1, Asfandyar Khan2, Abdullah Khan2

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2293-2311, 2023, DOI:10.32604/csse.2023.040312

    Abstract Numerous types of research on healthcare monitoring systems have been conducted for calculating heart rate, ECG, nasal/oral airflow, temperature, light sensor, and fall detection sensor. Different researchers have done different work in the field of health monitoring with sensor networks. Different researchers used built-in apps, such as some used a small number of parameters, while some other studies used more than one microcontroller and used senders and receivers among the microcontrollers to communicate, and outdated tools for study development. While no efficient, cheap, and updated work is proposed in the field of sensor-based health monitoring systems. Therefore, this study developed… More >

  • Open Access

    ARTICLE

    Evaluation of IoT Measurement Solutions from a Metrology Perspective

    Donatien Koulla Moulla1,2,*, Ernest Mnkandla1, Alain Abran3

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2455-2479, 2023, DOI:10.32604/csse.2023.039736

    Abstract To professionally plan and manage the development and evolution of the Internet of Things (IoT), researchers have proposed several IoT performance measurement solutions. IoT performance measurement solutions can be very valuable for managing the development and evolution of IoT systems, as they provide insights into performance issues, resource optimization, predictive maintenance, security, reliability, and user experience. However, there are several issues that can impact the accuracy and reliability of IoT performance measurements, including lack of standardization, complexity of IoT systems, scalability, data privacy, and security. While previous studies proposed several IoT measurement solutions in the literature, they did not evaluate… More >

  • Open Access

    REVIEW

    Quality of Experience in Internet of Things: A Systematic Literature Review

    Rawan Sanyour*, Manal Abdullah, Salha Abdullah

    Journal on Internet of Things, Vol.4, No.4, pp. 263-282, 2022, DOI:10.32604/jiot.2022.040966

    Abstract With the rapid growth of the Internet of Things paradigm, a tremendous number of applications and services that require minimal or no human involvement have been developed to enhance the quality of everyday life in various domains. In order to ensure that such services provide their functionalities with the expected quality, it is essential to measure and evaluate this quality, which can be in some cases a challenging task due to the lack of human intervention and feedback. Recently, the vast majority of the Quality of Experience QoE works mainly address the multimedia services. However, the introduction of Internet of… More >

  • Open Access

    ARTICLE

    Real Time Vehicle Status Monitoring under Moving Conditions Using a Low Power IoT System

    M. Vlachos1,*, R. Lopardo2, A. Amditis1

    Journal on Internet of Things, Vol.4, No.4, pp. 235-261, 2022, DOI:10.32604/jiot.2022.040820

    Abstract In the era of the Internet of Things (IoT), the ever-increasing number of devices connected to the IoT networks also increases the energy consumption on the edge. This is prohibitive since the devices living on the edge are generally resource constrained devices in terms of energy consumption and computational power. Thus, trying to tackle this issue, in this paper, a fully automated end-to-end IoT system for real time monitoring of the status of a moving vehicle is proposed. The IoT system consists mainly of three components: (1) the ultra-low power consumption Wireless Sensor Node (WSN), (2) the IoT gateway and… More >

  • Open Access

    ARTICLE

    Single Image Deraining Using Dual Branch Network Based on Attention Mechanism for IoT

    Di Wang, Bingcai Wei, Liye Zhang*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.2, pp. 1989-2000, 2023, DOI:10.32604/cmes.2023.028529

    Abstract Extracting useful details from images is essential for the Internet of Things project. However, in real life, various external environments,such as badweather conditions,will cause the occlusion of key target information and image distortion, resulting in difficulties and obstacles to the extraction of key information, affecting the judgment of the real situation in the process of the Internet of Things, and causing system decision-making errors and accidents. In this paper, we mainly solve the problem of rain on the image occlusion, remove the rain grain in the image, and get a clear image without rain. Therefore, the single image deraining algorithm… More >

  • Open Access

    ARTICLE

    Single Image Desnow Based on Vision Transformer and Conditional Generative Adversarial Network for Internet of Vehicles

    Bingcai Wei, Di Wang, Zhuang Wang, Liye Zhang*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.2, pp. 1975-1988, 2023, DOI:10.32604/cmes.2023.027727

    Abstract With the increasing popularity of artificial intelligence applications, machine learning is also playing an increasingly important role in the Internet of Things (IoT) and the Internet of Vehicles (IoV). As an essential part of the IoV, smart transportation relies heavily on information obtained from images. However, inclement weather, such as snowy weather, negatively impacts the process and can hinder the regular operation of imaging equipment and the acquisition of conventional image information. Not only that, but the snow also makes intelligent transportation systems make the wrong judgment of road conditions and the entire system of the Internet of Vehicles adverse.… More > Graphic Abstract

    Single Image Desnow Based on Vision Transformer and Conditional Generative Adversarial Network for Internet of Vehicles

  • Open Access

    ARTICLE

    Machine Learning-Based Efficient Discovery of Software Vulnerability for Internet of Things

    So-Eun Jeon, Sun-Jin Lee, Il-Gu Lee*

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2407-2419, 2023, DOI:10.32604/iasc.2023.039937

    Abstract With the development of the 5th generation of mobile communication (5G) networks and artificial intelligence (AI) technologies, the use of the Internet of Things (IoT) has expanded throughout industry. Although IoT networks have improved industrial productivity and convenience, they are highly dependent on nonstandard protocol stacks and open-source-based, poorly validated software, resulting in several security vulnerabilities. However, conventional AI-based software vulnerability discovery technologies cannot be applied to IoT because they require excessive memory and computing power. This study developed a technique for optimizing training data size to detect software vulnerabilities rapidly while maintaining learning accuracy. Experimental results using a software… More >

  • Open Access

    ARTICLE

    Intrusion Detection in the Internet of Things Using Fusion of GRU-LSTM Deep Learning Model

    Mohammad S. Al-kahtani1, Zahid Mehmood2,3,*, Tariq Sadad4, Islam Zada5, Gauhar Ali6, Mohammed ElAffendi6

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2279-2290, 2023, DOI:10.32604/iasc.2023.037673

    Abstract Cybersecurity threats are increasing rapidly as hackers use advanced techniques. As a result, cybersecurity has now a significant factor in protecting organizational limits. Intrusion detection systems (IDSs) are used in networks to flag serious issues during network management, including identifying malicious traffic, which is a challenge. It remains an open contest over how to learn features in IDS since current approaches use deep learning methods. Hybrid learning, which combines swarm intelligence and evolution, is gaining attention for further improvement against cyber threats. In this study, we employed a PSO-GA (fusion of particle swarm optimization (PSO) and genetic algorithm (GA)) for… More >

Displaying 51-60 on page 6 of 404. Per Page