Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (686)
  • Open Access

    ARTICLE

    A Hybrid Scheme for Secure Wireless Communications in IoT

    Muhammad Irshad Nazeer1,2,*, Ghulam Ali Mallah1, Raheel Ahmed Memon2

    Intelligent Automation & Soft Computing, Vol.29, No.2, pp. 633-648, 2021, DOI:10.32604/iasc.2021.017771

    Abstract Network Coding is a potential technology for the future wireless communications and Internet of Things (IoT) as it reduces the number of transmissions and offers energy efficiency. It is vulnerable to threat and attack that can harm intermediate nodes. Indeed, it exhibits an ability to incorporate security of transmitted data, yet a lot of work needs to be done to provide a safeguard from threats. The purpose of this study is to strengthen the existing Network Coding scheme with a set of generic requirements for Network Coding Protocols by adopting system models and a Genetic Algorithm based cryptosystem. A hybrid… More >

  • Open Access

    ARTICLE

    Complex Problems Solution as a Service Based on Predictive Optimization and Tasks Orchestration in Smart Cities

    Shabir Ahmad1, Jehad Ali2, Faisal Jamil3, Taeg Keun Whangbo1, DoHyeun Kim3,*

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1271-1288, 2021, DOI:10.32604/cmc.2021.017773

    Abstract Smart cities have different contradicting goals having no apparent solution. The selection of the appropriate solution, which is considered the best compromise among the candidates, is known as complex problem-solving. Smart city administrators face different problems of complex nature, such as optimal energy trading in microgrids and optimal comfort index in smart homes, to mention a few. This paper proposes a novel architecture to offer complex problem solutions as a service (CPSaaS) based on predictive model optimization and optimal task orchestration to offer solutions to different problems in a smart city. Predictive model optimization uses a machine learning module and… More >

  • Open Access

    REVIEW

    Morpho-Physiological, Biochemical and Molecular Adaptation of Millets to Abiotic Stresses: A Review

    Seerat Saleem1, Naveed Ul Mushtaq1, Wasifa Hafiz Shah1, Aadil Rasool1, Khalid Rehman Hakeem2,*, Reiaz Ul Rehman1,*

    Phyton-International Journal of Experimental Botany, Vol.90, No.5, pp. 1363-1385, 2021, DOI:10.32604/phyton.2021.014826

    Abstract Abiotic stresses such as drought, heat, cold, nutrient deficiency, excess salt and hazardous metals can hamper plantgrowth and development. Intensive agriculture of only a few major staple food crops that are sensitive and intolerant to environmental stresses has led to an agrarian crisis. On the other hand, nutritionally rich, gluten free and stress tolerant plants like millets are neglected and underutilized. Millets sustain about one-third of the world’s population and show exceptional tolerance to various abiotic and biotic stresses. Millets are C4 plants that are adapted to marginal and dry lands of arid and semi-arid regions, and survive low rainfall… More >

  • Open Access

    ARTICLE

    NVM Storage in IoT Devices: Opportunities and Challenges

    Yang Liu1, Shan Zhao1,*, Wenhan Chen1, Xuran Ge1, Fang Liu2, Shuo Li3, Nong Xiao1

    Computer Systems Science and Engineering, Vol.38, No.3, pp. 393-409, 2021, DOI:10.32604/csse.2021.017224

    Abstract Edge storage stores the data directly at the data collection point, and does not need to transmit the collected data to the storage central server through the network. It is a critical technology that supports applications such as edge computing and 5G network applications, with lower network communication overhead, lower interaction delay and lower bandwidth cost. However, with the explosion of data and higher real-time requirements, the traditional Internet of Things (IoT) storage architecture cannot meet the requirements of low latency and large capacity. Non-volatile memory (NVM) presents new possibilities regarding this aspect. This paper classifies the different storage architectures… More >

  • Open Access

    ARTICLE

    Spatiotemporal Characteristics of Traffic Accidents in China, 2016–2019

    Pengfei Gong1,2, Qun Wang2,*, Junjun Zhu3

    Intelligent Automation & Soft Computing, Vol.29, No.1, pp. 31-42, 2021, DOI:10.32604/iasc.2021.017695

    Abstract This study analyzed in-depth investigation reports for 418 traffic accidents with at least five deaths (TALFDs) in China from 2016 to 2019. Statistical analysis methods including hierarchical cluster analysis were employed to examine the distribution characteristics of these accidents. Accidents were found to be concentrated in July and August, and the distribution over the seven days of the week was relatively uniform; only Sunday had a higher number of accidents and deaths. In terms of 24-hour distribution, the one-hour periods with the most accidents and deaths were 8:00–9:00, 10:00–11:00, 14:00–15:00, and 18:00–19:00. Tibet, Qinghai, and Ningxia had the highest death… More >

  • Open Access

    ARTICLE

    Energy Aware Clustering with Multihop Routing Algorithm for Wireless Sensor Networks

    A. Daniel*, K.M. Baalamurugan, Vijay Ramalingam, KP Arjun

    Intelligent Automation & Soft Computing, Vol.29, No.1, pp. 233-246, 2021, DOI:10.32604/iasc.2021.016405

    Abstract The Internet of Things (IoT) and the Wireless Sensor Network (WSN) concepts are currently combined to improve data transmission based on sensors in near future applications. Since IoT devices exist in WSN with built-in batteries, power efficiency is a challenge that must be resolved. Clustering and routing are effectively treated as methods for reducing the dissipation of energy and maximising WSN IoT support life. This paper presents the new Energy Aware Adaptive Fuzzy neuro clustering with the WSN assisted IoT algorithm EAANFC-MR. EAANFC-MR is proposed for two main stages, clustering and multihop routing on the basis of EAANFCs. For selecting… More >

  • Open Access

    ARTICLE

    Development of a Multi-feature Web-based Physiotherapy Service System

    Sadman Ahmed1, Mohammad Monirujjaman Khan1,*, Roobaea Alroobaea2, Mehedi Masud2

    Intelligent Automation & Soft Computing, Vol.29, No.1, pp. 43-54, 2021, DOI:10.32604/iasc.2021.015914

    Abstract Physiotherapy is important to people with arthritis, and physiotherapists help them to resume or continue active, independent lives at home and work. Physiotherapy addresses many pain categories; however, this important treatment is still overlooked in Bangladesh, where many people suffer from physical pain. This study presents a multi-feature web-based physiotherapy application. A user can register as a doctor or patient via email or phone using the web application. A therapist’s information is verified manually by a system administrator. Using the application, patients can select a variety of features for treatment. Patients can watch physiotherapy video tutorials, find a physiotherapy clinic… More >

  • Open Access

    ARTICLE

    Secure Multifactor Remote Access User Authentication Framework for IoT Networks

    Mohammed Mujib Alshahrani*

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3235-3254, 2021, DOI:10.32604/cmc.2021.015310

    Abstract The term IoT refers to the interconnection and exchange of data among devices/sensors. IoT devices are often small, low cost, and have limited resources. The IoT issues and challenges are growing increasingly. Security and privacy issues are among the most important concerns in IoT applications, such as smart buildings. Remote cybersecurity attacks are the attacks which do not require physical access to the IoT networks, where the attacker can remotely access and communicate with the IoT devices through a wireless communication channel. Thus, remote cybersecurity attacks are a significant threat. Emerging applications in smart environments such as smart buildings require… More >

  • Open Access

    ARTICLE

    IoT Services: Realizing Private Real-Time Detection via Authenticated Conjunctive Searchable Encryption

    Chungen Xu1,*, Lin Mei1, Jinxue Cheng2, Yu Zhao1, Cong Zuo3

    Journal of Cyber Security, Vol.3, No.1, pp. 55-67, 2021, DOI:10.32604/jcs.2021.017217

    Abstract With the rapid development of wireless communication technology, the Internet of Things is playing an increasingly important role in our everyday. The amount of data generated by sensor devices is increasing as a large number of connectable devices are deployed in many fields, including the medical, agricultural, and industrial areas. Uploading data to the cloud solves the problem of data overhead but results in privacy issues. Therefore, the question of how to manage the privacy of uploading data and make it available to be interconnected between devices is a crucial issue. In this paper, we propose a scheme that supports… More >

  • Open Access

    REVIEW

    Oxidative metabolism of photosynthetic species and the exposure to some freshwater and marine biotoxins

    SUSANA PUNTARULO1,2, PAULA MARIELA GONZÁLEZ1,2,*

    BIOCELL, Vol.45, No.4, pp. 813-821, 2021, DOI:10.32604/biocell.2021.015360

    Abstract Environmental climate conditions could lead to an increasing global occurrence of microorganism blooms that synthesize toxins in the aquatic environments. These blooms could result in significantly toxic events. Responses of photosynthetic organisms to adverse environmental conditions implicate reactive oxygen species generation; but, due to the presence of a varied cellular antioxidant defense system and complex signaling networks, this oxidative stress could act as an important factor in the environmental adaptive processes. The objective of this review was to assess how some biotoxins are implicated in the generation of oxidative and nitrosative metabolic changes, not only in biotoxin-producing organisms but also… More >

Displaying 541-550 on page 55 of 686. Per Page