Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (61)
  • Open Access

    ARTICLE

    Novel Architecture of OneM2M-Based Convergence Platform for Mixed Reality and IoT

    Seungwoon Lee1, Woogeun Kil1, Byeong-hee Roh1,*, SJ Kim2, Jin-suk Kang3

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 51-69, 2022, DOI:10.32604/cmc.2022.019635 - 03 November 2021

    Abstract There have been numerous works proposed to merge augmented reality/mixed reality (AR/MR) and Internet of Things (IoT) in various ways. However, they have focused on their specific target applications and have limitations on interoperability or reusability when utilizing them to different domains or adding other devices to the system. This paper proposes a novel architecture of a convergence platform for AR/MR and IoT systems and services. The proposed architecture adopts the oneM2M IoT standard as the basic framework that converges AR/MR and IoT systems and enables the development of application services used in general-purpose environments More >

  • Open Access

    An Access Control Scheme Using Heterogeneous Signcryption for IoT Environments

    Insaf Ullah1,*, Hira Zahid2 , Fahad Algarni3, Muhammad Asghar Khan1

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4307-4321, 2022, DOI:10.32604/cmc.2022.017380 - 11 October 2021

    Abstract

    When the Wireless Sensor Network (WSN) is combined with the Internet of Things (IoT), it can be employed in a wide range of applications, such as agriculture, industry 4.0, health care, smart homes, among others. Accessing the big data generated by these applications in Cloud Servers (CSs), requires higher levels of authenticity and confidentiality during communication conducted through the Internet. Signcryption is one of the most promising approaches nowadays for overcoming such obstacles, due to its combined nature, i.e., signature and encryption. A number of researchers have developed schemes to address issues related to access control

    More >

  • Open Access

    ARTICLE

    Using Mobile Technology to Construct a Network Medical Health Care System

    Sung-Jung Hsiao1, Wen-Tsai Sung2,*

    Intelligent Automation & Soft Computing, Vol.31, No.2, pp. 729-748, 2022, DOI:10.32604/iasc.2022.020332 - 22 September 2021

    Abstract In this study, a multisensory physiological measurement system was built with wireless transmission technology, using a DSPIC30F4011 as the master control center and equipped with physiological signal acquisition modules such as an electrocardiogram module, blood pressure module, blood oxygen concentration module, and respiratory rate module. The physiological data were transmitted wirelessly to Android-based mobile applications via the TCP/IP or Bluetooth serial ports of Wi-Fi. The Android applications displayed the acquired physiological signals in real time and performed a preliminary abnormity diagnosis based on the measured physiological data and built-in index diagnostic data provided by doctors,… More >

  • Open Access

    ARTICLE

    An IoT-Aware System for Managing Patients’ Waiting Time Using Bluetooth Low-Energy Technology

    Reham Alabduljabbar*

    Computer Systems Science and Engineering, Vol.40, No.1, pp. 1-16, 2022, DOI:10.32604/csse.2022.018102 - 26 August 2021

    Abstract It is a common observation that whenever patients arrives at the front desk of a hospital, outpatient clinic, or other health-associated centers, they have to first queue up in a line and wait to fill in their registration form to get admitted. The long waiting time without any status updates is the most common complaint, concerning health officials. In this paper, UrNext, a location-aware mobile-based solution using Bluetooth low-energy (BLE) technology is presented to solve the problem. Recently, a technology-oriented method, the Internet of Things (IoT), has been gaining popularity in helping to solve some… More >

  • Open Access

    ARTICLE

    Transfer Learning Model to Indicate Heart Health Status Using Phonocardiogram

    Vinay Arora1, Karun Verma1, Rohan Singh Leekha2, Kyungroul Lee3, Chang Choi4,*, Takshi Gupta5, Kashish Bhatia6

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 4151-4168, 2021, DOI:10.32604/cmc.2021.019178 - 24 August 2021

    Abstract The early diagnosis of pre-existing coronary disorders helps to control complications such as pulmonary hypertension, irregular cardiac functioning, and heart failure. Machine-based learning of heart sound is an {efficient} technology which can help minimize the workload of manual auscultation by automatically identifying irregular cardiac sounds. Phonocardiogram (PCG) and electrocardiogram (ECG) waveforms provide the much-needed information for the diagnosis of these diseases. In this work, the researchers have converted the heart sound signal into its corresponding repeating pattern-based spectrogram. PhysioNet 2016 and PASCAL 2011 have been taken as the benchmark datasets to perform experimentation. The existing More >

  • Open Access

    ARTICLE

    Energy-Efficient and Blockchain-Enabled Model for Internet of Things (IoT) in Smart Cities

    Norah Saleh Alghamdi1,*, Mohammad Ayoub Khan2

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2509-2524, 2021, DOI:10.32604/cmc.2021.014180 - 28 December 2020

    Abstract Wireless sensor networks (WSNs) and Internet of Things (IoT) have gained more popularity in recent years as an underlying infrastructure for connected devices and sensors in smart cities. The data generated from these sensors are used by smart cities to strengthen their infrastructure, utilities, and public services. WSNs are suitable for long periods of data acquisition in smart cities. To make the networks of smart cities more reliable for sensitive information, the blockchain mechanism has been proposed. The key issues and challenges of WSNs in smart cities is efficiently scheduling the resources; leading to extending More >

  • Open Access

    ARTICLE

    Data Security Storage Model of the Internet of Things Based on Blockchain

    Pingshui Wang1,2,*, Willy Susilo2

    Computer Systems Science and Engineering, Vol.36, No.1, pp. 213-224, 2021, DOI:10.32604/csse.2021.014541 - 23 December 2020

    Abstract With the development of information technology, the Internet of Things (IoT) has gradually become the third wave of the worldwide information industry revolution after the computer and the Internet. The application of the IoT has brought great convenience to people’s production and life. However, the potential information security problems in various IoT applications are gradually exposed and people pay more attention to them. The traditional centralized data storage and management model of the IoT is easy to cause transmission delay, single point of failure, privacy disclosure and other problems, and eventually leads to unpredictable behavior More >

  • Open Access

    ARTICLE

    Multi Level Key Exchange and Encryption Protocol for Internet of Things (IoT)

    Poomagal C T1,∗, Sathish kumar G A2, Deval Mehta3

    Computer Systems Science and Engineering, Vol.35, No.1, pp. 51-63, 2020, DOI:10.32604/csse.2020.35.051

    Abstract The burgeoning network communications for multiple applications such as commercial, IoT, consumer devices, space, military, and telecommunications are facing many security and privacy challenges. Over the past decade, the Internet of Things (IoT) has been a focus of study. Security and privacy are the most important problems for IoT applications and are still facing huge difficulties. To promote this high-security IoT domain and prevent security attacks from unauthorized users, keys are frequently exchanged through a public key exchange algorithm. This paper introduces a novel algorithm based on Elliptic Curve Cryptography(ECC) for multi-level Public Key Exchange More >

  • Open Access

    ARTICLE

    Context-Based Intelligent Scheduling and Knowledge Push Algorithms for AR-Assist Communication Network Maintenance

    Lanlan Rui1, Yabin Qin1,*, Biyao Li1, Zhipeng Gao1

    CMES-Computer Modeling in Engineering & Sciences, Vol.118, No.2, pp. 291-315, 2019, DOI:10.31614/cmes.2018.04240

    Abstract Maintenance is an important aspect in the lifecycle of communication network devices. Prevalent problems in the maintenance of communication networks include inconvenient data carrying and sub-optimal scheduling of work orders, which significantly restrict the efficiency of maintenance work. Moreover, most maintenance systems are still based on cloud architectures that slow down data transfer. With a focus on the completion time, quality, and load balancing of maintenance work, we propose in this paper a learning-based virus evolutionary genetic algorithm with multiple quality-of-service (QoS) constraints to implement intelligent scheduling in an edge network. The algorithm maintains the More >

  • Open Access

    ARTICLE

    Smart Security Framework for Educational Institutions Using Internet of Things (IoT)

    Afzal Badshah1, Anwar Ghani1, Muhammad Ahsan Qureshi2, Shahaboddin Shamshirband,3,4,*

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 81-101, 2019, DOI:10.32604/cmc.2019.06288

    Abstract Educational institutions are soft targets for the terrorist with massive and defenseless people. In the recent past, numbers of such attacks have been executed around the world. Conducting research, in order to provide a secure environment to the educational institutions is a challenging task. This effort is motivated by recent assaults, made at Army Public School Peshawar, following another attack at Charsada University, Khyber Pukhtun Khwa, Pakistan and also the Santa Fe High School Texas, USA massacre. This study uses the basic technologies of edge computing, cloud computing and IoT to design a smart emergency… More >

Displaying 51-60 on page 6 of 61. Per Page