Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (686)
  • Open Access

    ARTICLE

    Automatic PV Grid Fault Detection System with IoT and LabVIEW as Data Logger

    Rohit Samkria1, Mohammed Abd-Elnaby2, Rajesh Singh3, Anita Gehlot3, Mamoon Rashid4,*, Moustafa H. Aly5, Walid El-Shafai6

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1709-1723, 2021, DOI:10.32604/cmc.2021.018525

    Abstract Fault detection of the photovoltaic (PV) grid is necessary to detect serious output power reduction to avoid PV modules’ damage. To identify the fault of the PV arrays, there is a necessity to implement an automatic system. In this IoT and LabVIEW-based automatic fault detection of 3 × 3 solar array, a PV system is proposed to control and monitor Internet connectivity remotely. Hardware component to automatically reconfigure the solar PV array from the series-parallel (SP) to the complete cross-linked array underneath partial shading conditions (PSC) is centered on the Atmega328 system to achieve maximum power. In the LabVIEW environment,… More >

  • Open Access

    ARTICLE

    Towards Machine Learning Based Intrusion Detection in IoT Networks

    Nahida Islam1, Fahiba Farhin1, Ishrat Sultana1, M. Shamim Kaiser1, Md. Sazzadur Rahman1, Mufti Mahmud2, A. S. M. Sanwar Hosen3, Gi Hwan Cho3,*

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1801-1821, 2021, DOI:10.32604/cmc.2021.018466

    Abstract The Internet of Things (IoT) integrates billions of self-organized and heterogeneous smart nodes that communicate with each other without human intervention. In recent years, IoT based systems have been used in improving the experience in many applications including healthcare, agriculture, supply chain, education, transportation and traffic monitoring, utility services etc. However, node heterogeneity raised security concern which is one of the most complicated issues on the IoT. Implementing security measures, including encryption, access control, and authentication for the IoT devices are ineffective in achieving security. In this paper, we identified various types of IoT threats and shallow (such as decision… More >

  • Open Access

    ARTICLE

    Machine Learning Applied to Problem-Solving in Medical Applications

    Mahmoud Ragab1,2, Ali Algarni3, Adel A. Bahaddad4, Romany F. Mansour5,*

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2277-2294, 2021, DOI:10.32604/cmc.2021.018000

    Abstract Physical health plays an important role in overall well-being of the human beings. It is the most observed dimension of health among others such as social, intellectual, emotional, spiritual and environmental dimensions. Due to exponential increase in the development of wireless communication techniques, Internet of Things (IoT) has effectively penetrated different aspects of human lives. Healthcare is one of the dynamic domains with ever-growing demands which can be met by IoT applications. IoT can be leveraged through several health service offerings such as remote health and monitoring services, aided living, personalized treatment, and so on. In this scenario, Deep Learning… More >

  • Open Access

    ARTICLE

    Towards a Dynamic Virtual IoT Network Based on User Requirements

    Faisal Mehmood1, Shabir Ahmad2,3, Israr Ullah1, Faisal Jamil1, DoHyeun Kim1,*

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2231-2244, 2021, DOI:10.32604/cmc.2021.017528

    Abstract The data being generated by the Internet of Things needs to be stored, monitored, and analyzed for maximum IoT resource utilization. Software Defined Networking has been extensively utilized to address issues such as heterogeneity and scalability. However, for small-scale IoT application, sometimes it is considered an inefficient approach. This paper proposes an alternate lightweight mechanism to the design and implementation of a dynamic virtual network based on user requirements. The key idea is to provide users a virtual interface that enables them to reconfigure the communication flow between the sensors and actuators at runtime. The throughput of the communication flow… More >

  • Open Access

    ARTICLE

    An Efficient GCD-Based Cancelable Biometric Algorithm for Single and Multiple Biometrics

    Naglaa F. Soliman1,2, Abeer D. Algarni1,*, Walid El-Shafai3, Fathi E. Abd El-Samie1,3, Ghada M. El Banby4

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1571-1595, 2021, DOI:10.32604/cmc.2021.016980

    Abstract Cancelable biometrics are required in most remote access applications that need an authentication stage such as the cloud and Internet of Things (IoT) networks. The objective of using cancelable biometrics is to save the original ones from hacking attempts. A generalized algorithm to generate cancelable templates that is applicable on both single and multiple biometrics is proposed in this paper to be considered for cloud and IoT applications. The original biometric is blurred with two co-prime operators. Hence, it can be recovered as the Greatest Common Divisor (GCD) between its two blurred versions. Minimal changes if induced in the biometric… More >

  • Open Access

    ARTICLE

    Few-Shot Learning for Discovering Anomalous Behaviors in Edge Networks

    Merna Gamal1, Hala M. Abbas2, Nour Moustafa3,*, Elena Sitnikova3, Rowayda A. Sadek1

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1823-1837, 2021, DOI:10.32604/cmc.2021.012877

    Abstract Intrusion Detection Systems (IDSs) have a great interest these days to discover complex attack events and protect the critical infrastructures of the Internet of Things (IoT) networks. Existing IDSs based on shallow and deep network architectures demand high computational resources and high volumes of data to establish an adaptive detection engine that discovers new families of attacks from the edge of IoT networks. However, attackers exploit network gateways at the edge using new attacking scenarios (i.e., zero-day attacks), such as ransomware and Distributed Denial of Service (DDoS) attacks. This paper proposes new IDS based on Few-Shot Deep Learning, named CNN-IDS,… More >

  • Open Access

    ARTICLE

    Development of a Module for Measuring Electrical Variables in Power Transformers Based in IoT, to Manage and Monitoring by Telemetry Mechanism

    Jesus Hamilton Ortiz1, Javier Ferney Castillo García2, Osamah Ibrahim Khalaf3, Fernando Velez Varela2,*, Pedro Jefferson Barragan Baron2, Jhon Hadder Guzmán Atehortúa2

    Journal on Internet of Things, Vol.3, No.2, pp. 53-63, 2021, DOI:10.32604/jiot.2021.014736

    Abstract This work shows the development of a module that performs measurements of electrical variables in a low voltage power transformer. These variables are sent by means of the IEEE802.11 standard, connecting to a database stored in the cloud; associating with the meter IoT concepts, this to allow a client to perform an analysis, monitoring and management of their electrical network. For the construction of this module, non-invasive current sensors connected to a three-phase meter are used and a communication card is used that allows data to be extracted from the meter and sent to the cloud database. This module, to… More >

  • Open Access

    ARTICLE

    Control of seed born mycobiota associated with Glycine max L. Merr. seeds by a combination of traditional medicinal plants extracts

    SULAIMAN A. AL YOUSEF*

    BIOCELL, Vol.45, No.5, pp. 1403-1411, 2021, DOI:10.32604/biocell.2021.015450

    Abstract Seeds from soybean collected from different commercial markets were surveyed for seed-borne fungi. Ninetyeight fungal colonies were isolated all over three monthly isolations constituting twenty-two fungal species. The isolated fungi were belonging to the genera: Alternaria, Aspergillus, Cephalosporium, Chaetomium, Cladosporium, Colletotrichum, Curvularia, Fusarium, Macrophomina, Mucor, Penicillium, Rhizoctonia, Rhizopus, Sclerotium, Stemphylium, and Verticillium. Assay of the antifungal activity of four ethanolic extracts of clove, cinnamon, garlic, and mint was carried out against the most common fungal species (Aspergillus flavus, A. niger, Fusarium solani, F. oxysporium, and F. moniliforme), which significantly reduced the growth of tested fungi. Clove extract recorded the highest… More >

  • Open Access

    ARTICLE

    Villin Family Members Associated with Multiple Stress Responses in Cotton

    Fenni Lv1,2,#, Sen Wang3,#, Ruiping Tian1, Peng Wang2, Kang Liu1,*

    Phyton-International Journal of Experimental Botany, Vol.90, No.6, pp. 1645-1660, 2021, DOI:10.32604/phyton.2021.016947

    Abstract Villin (VLN) is considered to be one of the most important actin-binding proteins, participates in modulating the actin cytoskeleton dynamics, plays essential role in plant development and resisting adverse environments. However, systematic studies of the VLN gene family have not been reported in cotton (Gossypium). In this study, 14 GhVLNs were identified in G. hirsutum. These GhVLN genes were distributed in 6 A-subgenome chromosomes and 6 D-subgenome chromosomes of the allotetraploid upland cotton and classified into three phylogenetical groups based on the classification model of AtVLNs. In addition, the 14 GhVLN genes have highly conserved gene structure and motif architecture.… More >

  • Open Access

    ARTICLE

    CNN-Based Voice Emotion Classification Model for Risk Detection

    Hyun Yoo1, Ji-Won Baek2, Kyungyong Chung3,*

    Intelligent Automation & Soft Computing, Vol.29, No.2, pp. 319-334, 2021, DOI:10.32604/iasc.2021.018115

    Abstract With the convergence and development of the Internet of things (IoT) and artificial intelligence, closed-circuit television, wearable devices, and artificial neural networks have been combined and applied to crime prevention and follow-up measures against crimes. However, these IoT devices have various limitations based on the physical environment and face the fundamental problem of privacy violations. In this study, voice data are collected and emotions are classified based on an acoustic sensor that is free of privacy violations and is not sensitive to changes in external environments, to overcome these limitations. For the classification of emotions in the voice, the data… More >

Displaying 531-540 on page 54 of 686. Per Page