Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (680)
  • Open Access

    ARTICLE

    IoT Task Offloading in Edge Computing Using Non-Cooperative Game Theory for Healthcare Systems

    Dinesh Mavaluru1,*, Chettupally Anil Carie2, Ahmed I. Alutaibi3, Satish Anamalamudi2, Bayapa Reddy Narapureddy4, Murali Krishna Enduri2, Md Ezaz Ahmed1

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1487-1503, 2024, DOI:10.32604/cmes.2023.045277

    Abstract In this paper, we present a comprehensive system model for Industrial Internet of Things (IIoT) networks empowered by Non-Orthogonal Multiple Access (NOMA) and Mobile Edge Computing (MEC) technologies. The network comprises essential components such as base stations, edge servers, and numerous IIoT devices characterized by limited energy and computing capacities. The central challenge addressed is the optimization of resource allocation and task distribution while adhering to stringent queueing delay constraints and minimizing overall energy consumption. The system operates in discrete time slots and employs a quasi-static approach, with a specific focus on the complexities of task partitioning and the management… More >

  • Open Access

    ARTICLE

    Hash Table Assisted Efficient File Level De-Duplication Scheme in SD-IoV Assisted Sensing Devices

    Ghawar Said1, Ata Ullah2, Anwar Ghani1,*, Muhammad Azeem1, Khalid Yahya3, Muhammad Bilal4, Sayed Chhattan Shah5,*

    Intelligent Automation & Soft Computing, Vol.38, No.1, pp. 83-99, 2023, DOI:10.32604/iasc.2023.036079

    Abstract The Internet of Things (IoT) and cloud technologies have encouraged massive data storage at central repositories. Software-defined networks (SDN) support the processing of data and restrict the transmission of duplicate values. It is necessary to use a data de-duplication mechanism to reduce communication costs and storage overhead. Existing State of the art schemes suffer from computational overhead due to deterministic or random tree-based tags generation which further increases as the file size grows. This paper presents an efficient file-level de-duplication scheme (EFDS) where the cost of creating tags is reduced by employing a hash table with key-value pair for each… More >

  • Open Access

    ARTICLE

    The Effect of Soil Enzymes and Polysaccharides Secreted by the Roots of Salvia miltiorrhiza Bunge under Drought, High Temperature, and Nitrogen and Phosphorus Deficits

    Yong Qin1,2, Xiaoyu Li1,2, Yanhong Wu1,2, Hai Wang3, Guiqi Han1,2,3, Zhuyun Yan1,2,*

    Phyton-International Journal of Experimental Botany, Vol.93, No.1, pp. 119-135, 2024, DOI:10.32604/phyton.2023.046075

    Abstract Root exudates serve as crucial mediators for information exchange between plants and soil, and are an important evolutionary mechanism for plants’ adaptation to environmental changes. In this study, 15 different abiotic stress models were established using various stress factors, including drought (D), high temperature (T), nitrogen deficiency (N), phosphorus deficiency (P), and their combinations. We investigated their effects on the seedling growth of Salvia miltiorrhiza Bunge and the activities of Solid-Urease (S-UE), Solid-Nitrite Reductase (S-NiR), Solid-Nitrate Reductase (S-NR), Solid-Phosphotransferase (S-PT), and Solid-Catalase (S-CAT), as well as the contents of polysaccharides in the culture medium. The results showed that the growth… More >

  • Open Access

    ARTICLE

    Block Incremental Dense Tucker Decomposition with Application to Spatial and Temporal Analysis of Air Quality Data

    SangSeok Lee1, HaeWon Moon1, Lee Sael1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.1, pp. 319-336, 2024, DOI:10.32604/cmes.2023.031150

    Abstract How can we efficiently store and mine dynamically generated dense tensors for modeling the behavior of multidimensional dynamic data? Much of the multidimensional dynamic data in the real world is generated in the form of time-growing tensors. For example, air quality tensor data consists of multiple sensory values gathered from wide locations for a long time. Such data, accumulated over time, is redundant and consumes a lot of memory in its raw form. We need a way to efficiently store dynamically generated tensor data that increase over time and to model their behavior on demand between arbitrary time blocks. To… More > Graphic Abstract

    Block Incremental Dense Tucker Decomposition with Application to Spatial and Temporal Analysis of Air Quality Data

  • Open Access

    ARTICLE

    Integration of Digital Twins and Artificial Intelligence for Classifying Cardiac Ischemia

    Mohamed Ammar1,*, Hamed Al-Raweshidy2,*

    Journal on Artificial Intelligence, Vol.5, pp. 195-218, 2023, DOI:10.32604/jai.2023.045199

    Abstract Despite advances in intelligent medical care, difficulties remain. Due to its complicated governance, designing, planning, improving, and managing the cardiac system remains difficult. Oversight, including intelligent monitoring, feedback systems, and management practises, is unsuccessful. Current platforms cannot deliver lifelong personal health management services. Insufficient accuracy in patient crisis warning programmes. No frequent, direct interaction between healthcare workers and patients is visible. Physical medical systems and intelligent information systems are not integrated. This study introduces the Advanced Cardiac Twin (ACT) model integrated with Artificial Neural Network (ANN) to handle real-time monitoring, decision-making, and crisis prediction. THINGSPEAK is used to create an… More >

  • Open Access

    ARTICLE

    Hybrid Algorithm-Driven Smart Logistics Optimization in IoT-Based Cyber-Physical Systems

    Abdulwahab Ali Almazroi1,*, Nasir Ayub2

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3921-3942, 2023, DOI:10.32604/cmc.2023.046602

    Abstract Effectively managing complex logistics data is essential for development sustainability and growth, especially in optimizing distribution routes. This article addresses the limitations of current logistics path optimization methods, such as inefficiencies and high operational costs. To overcome these drawbacks, we introduce the Hybrid Firefly-Spotted Hyena Optimization (HFSHO) algorithm, a novel approach that combines the rapid exploration and global search abilities of the Firefly Algorithm (FO) with the localized search and region-exploitation skills of the Spotted Hyena Optimization Algorithm (SHO). HFSHO aims to improve logistics path optimization and reduce operational costs. The algorithm’s effectiveness is systematically assessed through rigorous comparative analyses… More >

  • Open Access

    ARTICLE

    Blockchain-Based Cognitive Computing Model for Data Security on a Cloud Platform

    Xiangmin Guo1,2, Guangjun Liang1,2,*, Jiayin Liu1,2, Xianyi Chen3,*

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3305-3323, 2023, DOI:10.32604/cmc.2023.044529

    Abstract Cloud storage is widely used by large companies to store vast amounts of data and files, offering flexibility, financial savings, and security. However, information shoplifting poses significant threats, potentially leading to poor performance and privacy breaches. Blockchain-based cognitive computing can help protect and maintain information security and privacy in cloud platforms, ensuring businesses can focus on business development. To ensure data security in cloud platforms, this research proposed a blockchain-based Hybridized Data Driven Cognitive Computing (HD2C) model. However, the proposed HD2C framework addresses breaches of the privacy information of mixed participants of the Internet of Things (IoT) in the cloud.… More >

  • Open Access

    ARTICLE

    DL-Powered Anomaly Identification System for Enhanced IoT Data Security

    Manjur Kolhar*, Sultan Mesfer Aldossary

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 2857-2879, 2023, DOI:10.32604/cmc.2023.042726

    Abstract In many commercial and public sectors, the Internet of Things (IoT) is deeply embedded. Cyber security threats aimed at compromising the security, reliability, or accessibility of data are a serious concern for the IoT. Due to the collection of data from several IoT devices, the IoT presents unique challenges for detecting anomalous behavior. It is the responsibility of an Intrusion Detection System (IDS) to ensure the security of a network by reporting any suspicious activity. By identifying failed and successful attacks, IDS provides a more comprehensive security capability. A reliable and efficient anomaly detection system is essential for IoT-driven decision-making.… More >

  • Open Access

    ARTICLE

    One Dimensional Conv-BiLSTM Network with Attention Mechanism for IoT Intrusion Detection

    Bauyrzhan Omarov1,*, Zhuldyz Sailaukyzy2, Alfiya Bigaliyeva2, Adilzhan Kereyev3, Lyazat Naizabayeva4, Aigul Dautbayeva5

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3765-3781, 2023, DOI:10.32604/cmc.2023.042469

    Abstract In the face of escalating intricacy and heterogeneity within Internet of Things (IoT) network landscapes, the imperative for adept intrusion detection techniques has never been more pressing. This paper delineates a pioneering deep learning-based intrusion detection model: the One Dimensional Convolutional Neural Networks (1D-CNN) and Bidirectional Long Short-Term Memory (BiLSTM) Network (Conv-BiLSTM) augmented with an Attention Mechanism. The primary objective of this research is to engineer a sophisticated model proficient in discerning the nuanced patterns and temporal dependencies quintessential to IoT network traffic data, thereby facilitating the precise categorization of a myriad of intrusion types. Methodology: The proposed model amalgamates… More >

  • Open Access

    ARTICLE

    Application of Plant Growth-Promoting Bacteria as an Eco-Friendly Strategy for Mitigating the Harmful Effects of Abiotic Stress on Plants

    Ahmed Hassan Abdou1,*, Omar Abdullah Alkhateeb2, Hossam Eldin Hamed Mansour3, Hesham S. Ghazzawy4, Muayad Saud Albadrani5, Nadi Awad Al-harbi6, Wasimah B. Al-Shammari7, Khaled Abdelaal8,*

    Phyton-International Journal of Experimental Botany, Vol.92, No.12, pp. 3305-3321, 2023, DOI:10.32604/phyton.2023.044780

    Abstract Plant growth-promoting bacteria (PGPB) play an important role in improving agricultural production under several abiotic stress factors. PGPB can be used to increase crop growth and development through hormonal balance and increase nutrient uptake. The positive effect of PGPB may be due to its pivotal role in morphophysiological and biochemical characteristics like leaf number, leaf area, and stem length. Furthermore, relative water content, chlorophyll content, carotenoids, antioxidant enzymes, and plant hormones were improved with PGPB treatment. Crop yield and yield components were also increased with PGPB treatment in numerous crops. The anatomical structure of plant organs was increased such as… More >

Displaying 31-40 on page 4 of 680. Per Page