Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (992)
  • Open Access

    ARTICLE

    Optimal IoT Based Improved Deep Learning Model for Medical Image Classification

    Prasanalakshmi Balaji1,*, B. Sri Revathi2, Praveetha Gobinathan3, Shermin Shamsudheen3, Thavavel Vaiyapuri4

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2275-2291, 2022, DOI:10.32604/cmc.2022.028560 - 16 June 2022

    Abstract Recently medical image classification plays a vital role in medical image retrieval and computer-aided diagnosis system. Despite deep learning has proved to be superior to previous approaches that depend on handcrafted features; it remains difficult to implement because of the high intra-class variance and inter-class similarity generated by the wide range of imaging modalities and clinical diseases. The Internet of Things (IoT) in healthcare systems is quickly becoming a viable alternative for delivering high-quality medical treatment in today’s e-healthcare systems. In recent years, the Internet of Things (IoT) has been identified as one of the… More >

  • Open Access

    ARTICLE

    R-IDPS: Real Time SDN-Based IDPS System for IoT Security

    Noman Mazhar1,2, Rosli Saleh1,*, Reza Zaba1,3, Muhammad Zeeshan4, M. Muzaffar Hameed1, Nauman Khan1

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3099-3118, 2022, DOI:10.32604/cmc.2022.028285 - 16 June 2022

    Abstract The advent of the latest technologies like the Internet of things (IoT) transforms the world from a manual to an automated way of lifestyle. Meanwhile, IoT sector open numerous security challenges. In traditional networks, intrusion detection and prevention systems (IDPS) have been the key player in the market to ensure security. The challenges to the conventional IDPS are implementation cost, computing power, processing delay, and scalability. Further, online machine learning model training has been an issue. All these challenges still question the IoT network security. There has been a lot of research for IoT based… More >

  • Open Access

    ARTICLE

    Super Compact UWB Monopole Antenna for Small IoT Devices

    Ahmed Jamal Abdullah Al-Gburi1, Zahriladha Zakaria1,*, Merih Palandoken2, Imran Mohd Ibrahim1, A. A. Althuwayb3, Sarosh Ahmad4, Samir Salem Al-Bawri5

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2785-2799, 2022, DOI:10.32604/cmc.2022.028074 - 16 June 2022

    Abstract This article introduces a novel, ultrawideband (UWB) planar monopole antenna printed on Roger RT/5880 substrate in a compact size for small Internet of Things (IoT) applications. The total electrical dimensions of the proposed compact UWB antenna are 0.19 λo × 0.215 λo × 0.0196 λo with the overall physical sizes of 15 mm × 17 mm × 1.548 mm at the lower resonance frequency of 3.8 GHz. The planar monopole antenna is fed through the linearly tapered microstrip line on a partially structured ground plane to achieve optimum impedance matching for UWB operation. The proposed compact UWB… More >

  • Open Access

    ARTICLE

    An Effective Signcryption with Optimization Algorithm for IoT-enabled Secure Data Transmission

    A. Chinnappa*, C. Vijayakumaran

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 4017-4031, 2022, DOI:10.32604/cmc.2022.027858 - 16 June 2022

    Abstract Internet of Things (IoT) allows several low resources and controlled devices to interconnect, calculate processes and make decisions in the communication network. In the heterogeneous environment for IoT devices, several challenging issues such as energy, storage, efficiency, and security. The design of encryption techniques enables the transmission of the data in the IoT environment in a secured way. The proper selection of optimal keys helps to boost the encryption performance. With this motivation, the study presents a signcryption with quantum chaotic krill herd algorithm for secured data transmission (SCQCKH-SDT) in IoT environment. The proposed SCQCKH-SDT… More >

  • Open Access

    ARTICLE

    Construction and Optimization of TRNG Based Substitution Boxes for Block Encryption Algorithms

    Muhammad Fahad Khan1,2,*, Khalid Saleem1, Mohammed Alotaibi3, Mohammad Mazyad Hazzazi4, Eid Rehman2, Aaqif Afzaal Abbasi2, Muhammad Asif Gondal5

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2679-2696, 2022, DOI:10.32604/cmc.2022.027655 - 16 June 2022

    Abstract Internet of Things is an ecosystem of interconnected devices that are accessible through the internet. The recent research focuses on adding more smartness and intelligence to these edge devices. This makes them susceptible to various kinds of security threats. These edge devices rely on cryptographic techniques to encrypt the pre-processed data collected from the sensors deployed in the field. In this regard, block cipher has been one of the most reliable options through which data security is accomplished. The strength of block encryption algorithms against different attacks is dependent on its nonlinear primitive which is… More >

  • Open Access

    ARTICLE

    Efficient Computation Offloading of IoT-Based Workflows Using Discrete Teaching Learning-Based Optimization

    Mohamed K. Hussein1,*, Mohamed H. Mousa1,2

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3685-3703, 2022, DOI:10.32604/cmc.2022.026370 - 16 June 2022

    Abstract As the Internet of Things (IoT) and mobile devices have rapidly proliferated, their computationally intensive applications have developed into complex, concurrent IoT-based workflows involving multiple interdependent tasks. By exploiting its low latency and high bandwidth, mobile edge computing (MEC) has emerged to achieve the high-performance computation offloading of these applications to satisfy the quality-of-service requirements of workflows and devices. In this study, we propose an offloading strategy for IoT-based workflows in a high-performance MEC environment. The proposed task-based offloading strategy consists of an optimization problem that includes task dependency, communication costs, workflow constraints, device energy More >

  • Open Access

    ARTICLE

    A Compact Flexible Circularly Polarized Implantable Antenna for Biotelemetry Applications

    Sarosh Ahmad1,*, Shakir Ullah2, Adnan Ghaffar3, Daniel Segovia Vargas1

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2457-2472, 2022, DOI:10.32604/cmc.2022.025527 - 16 June 2022

    Abstract With the help of in-body antennas, the wireless communication among the implantable medical devices (IMDs) and exterior monitoring equipment, the telemetry system has brought us many benefits. Thus, a very thin-profile circularly polarized (CP) in-body antenna, functioning in ISM band at 2.45 GHz, is proposed. A tapered coplanar waveguide (CPW) method is used to excite the antenna. The radiator contains a pentagonal shape with five horizontal slits inside to obtain a circular polarization behavior. A bendable Roger Duroid RT5880 material (εr = 2.2, tanδ = 0.0009) with a typical 0.25 mm-thickness is used as a substrate.… More >

  • Open Access

    ARTICLE

    Smart Greenhouse Control via NB-IoT

    Wen-Tsai Sung1, Ching-Hao Weng1, Sung-Jung Hsiao2,*

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1971-1988, 2022, DOI:10.32604/iasc.2022.026927 - 25 May 2022

    Abstract The Internet of Things (IoT) has flourished in recent years, which brings convenience to people’s lives, improves the quality of life, allows more effectively managing and maximizing benefits in industry, and improves weather predictions as the impact of global warming has complicated traditional methods to infer the weather. To this end, agriculture has also given more attention to greenhouse cultivation. In the early days of industrial research, Wi-Fi and ZigBee were used as short-or medium-distance communication technologies for transmissions in the network layer of the IoT architecture. Instead of long-distance communication technologies, such as LoRa More >

  • Open Access

    ARTICLE

    Detection of DDoS Attack in IoT Networks Using Sample Selected RNN-ELM

    S. Hariprasad1,*, T. Deepa1, N. Bharathiraja2

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1425-1440, 2022, DOI:10.32604/iasc.2022.022856 - 25 May 2022

    Abstract The Internet of Things (IoT) is a global information and communication technology which aims to connect any type of device to the internet at any time and in any location. Nowadays billions of IoT devices are connected to the world, this leads to easily cause vulnerability to IoT devices. The increasing of users in different IoT-related applications leads to more data attacks is happening in the IoT networks after the fog layer. To detect and reduce the attacks the deep learning model is used. In this article, a hybrid sample selected recurrent neural network-extreme learning… More >

  • Open Access

    ARTICLE

    Novel DoS Attack Detection Based on Trust Mode Authentication for IoT

    D. Yuvaraj1, S. Shanmuga Priya2,*, M. Braveen3, S. Navaneetha Krishnan4, S. Nachiyappan5, Abolfazl Mehbodniya6, A. Mohamed Uvaze Ahamed7, M. Sivaram8

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1505-1522, 2022, DOI:10.32604/iasc.2022.022151 - 25 May 2022

    Abstract Wireless sensor networks are extensively utilized as a communication mechanism in the field of the Internet of Things (IoT). Along with these services, numerous IoT based applications need stabilized transmission or delivery over unbalanced wireless connections. To ensure the stability of data packets delivery, prevailing works exploit diverse geographical routing with multi-hop forwarders in WSNs. Furthermore, critical Denial of Service (DoS) attacks frequently has an impact on these techniques, where an enormous amount of invalid data starts replicating and transmitted to receivers to prevent Wireless Sensor Networks (WSN) communication. In this investigation, a novel adaptive… More >

Displaying 531-540 on page 54 of 992. Per Page