Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (680)
  • Open Access

    ARTICLE

    A Distributed ADMM Approach for Collaborative Regression Learning in Edge Computing

    Yangyang Li1, Xue Wang2, Weiwei Fang2,*, Feng Xue2, Hao Jin1, Yi Zhang1, Xianwei Li3

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 493-508, 2019, DOI:10.32604/cmc.2019.05178

    Abstract With the recent proliferation of Internet-of-Things (IoT), enormous amount of data are produced by wireless sensors and connected devices at the edge of network. Conventional cloud computing raises serious concerns on communication latency, bandwidth cost, and data privacy. To address these issues, edge computing has been introduced as a new paradigm that allows computation and analysis to be performed in close proximity with data sources. In this paper, we study how to conduct regression analysis when the training samples are kept private at source devices. Specifically, we consider the lasso regression model that has been widely adopted for prediction and… More >

  • Open Access

    ARTICLE

    Context-Based Intelligent Scheduling and Knowledge Push Algorithms for AR-Assist Communication Network Maintenance

    Lanlan Rui1, Yabin Qin1,*, Biyao Li1, Zhipeng Gao1

    CMES-Computer Modeling in Engineering & Sciences, Vol.118, No.2, pp. 291-315, 2019, DOI:10.31614/cmes.2018.04240

    Abstract Maintenance is an important aspect in the lifecycle of communication network devices. Prevalent problems in the maintenance of communication networks include inconvenient data carrying and sub-optimal scheduling of work orders, which significantly restrict the efficiency of maintenance work. Moreover, most maintenance systems are still based on cloud architectures that slow down data transfer. With a focus on the completion time, quality, and load balancing of maintenance work, we propose in this paper a learning-based virus evolutionary genetic algorithm with multiple quality-of-service (QoS) constraints to implement intelligent scheduling in an edge network. The algorithm maintains the diversity of the population and… More >

  • Open Access

    ARTICLE

    A Computational Modeling Framework for Heat Transfer Processes in Laser-Induced Dermal Tissue Removal

    T.I. Zohdi1

    CMES-Computer Modeling in Engineering & Sciences, Vol.98, No.3, pp. 261-277, 2014, DOI:10.32604/cmes.2014.098.261

    Abstract A widespread use of lasers is for the ablation of biological tissue, in particular for dermal applications involving the removal of cancerous tissue, skin spots, aged skin and wrinkles. For a laser to ablate tissue, the power intensity must be sufficiently high to induce vaporization/burning of the target material. However, if performed improperly, the process can cause excessive microscale thermal injuries to surrounding healthy tissue. This motivates the present work, which attempts to develop and assemble simple models for the primary heat transfer mechanisms that occur during the process. First, in order to qualitatively understand the system, the terms that… More >

  • Open Access

    ARTICLE

    Wave Propagation in Porous Piezoelectric Media

    A. Chakraborty1

    CMES-Computer Modeling in Engineering & Sciences, Vol.40, No.2, pp. 105-132, 2009, DOI:10.3970/cmes.2009.040.105

    Abstract A mathematical model is presented in this work that describes the behavior of porous piezoelectric materials subjected to mechanical load and electric field. The model combines Biot's theory of poroelasticity and the classical theory of piezoelectric material wherein it is assumed that piezoelectric coupling exists only with the solid phase of the porous medium. This model is used to analyze the stress and electric wave generated in bone and porous Lead-Zirconate-Titanate (PZT) due to high frequency pulse loading. The governing partial differential equations are solved in the frequency domain by transforming them into a polynomial eigenvalue structure. This approach permits… More >

  • Open Access

    ARTICLE

    Smart Security Framework for Educational Institutions Using Internet of Things (IoT)

    Afzal Badshah1, Anwar Ghani1, Muhammad Ahsan Qureshi2, Shahaboddin Shamshirband,3,4,*

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 81-101, 2019, DOI:10.32604/cmc.2019.06288

    Abstract Educational institutions are soft targets for the terrorist with massive and defenseless people. In the recent past, numbers of such attacks have been executed around the world. Conducting research, in order to provide a secure environment to the educational institutions is a challenging task. This effort is motivated by recent assaults, made at Army Public School Peshawar, following another attack at Charsada University, Khyber Pukhtun Khwa, Pakistan and also the Santa Fe High School Texas, USA massacre. This study uses the basic technologies of edge computing, cloud computing and IoT to design a smart emergency alarm system framework. IoT is… More >

  • Open Access

    ARTICLE

    An Efficient Greedy Traffic Aware Routing Scheme for Internet of Vehicles

    Belghachi Mohammed1,*, Debab Naouel1

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 959-972, 2019, DOI:10.32604/cmc.2019.07580

    Abstract A new paradigm of VANET has emerged in recent years: Internet of Vehicles (IoV). These networks are formed on the roads and streets between travellers who have relationships, interactions and common social interests. Users of these networks exchange information of common interest, for example, traffic jams and dangers on the way. They can also exchange files such as multimedia files. IoV is considered as part of the Internet of Things (IoT) where objects are vehicles, which can create a multitude of services dedicated to the intelligent transportation system. The interest is to permit to all connected vehicles to communicate with… More >

  • Open Access

    ARTICLE

    Enabling Comparable Search Over Encrypted Data for IoT with Privacy-Preserving

    Lei Xu1, Chungen Xu1,*, Zhongyi Liu1, Yunling Wang2,3, Jianfeng Wang2,3

    CMC-Computers, Materials & Continua, Vol.60, No.2, pp. 675-690, 2019, DOI:10.32604/cmc.2019.05276

    Abstract With the rapid development of cloud computing and Internet of Things (IoT) technology, massive data raises and shuttles on the network every day. To ensure the confidentiality and utilization of these data, industries and companies users encrypt their data and store them in an outsourced party. However, simple adoption of encryption scheme makes the original lose its flexibility and utilization. To address these problems, the searchable encryption scheme is proposed. Different from traditional encrypted data search scheme, this paper focuses on providing a solution to search the data from one or more IoT device by comparing their underlying numerical values.… More >

  • Open Access

    ARTICLE

    A Lightweight Three-Factor User Authentication Protocol for the Information Perception of IoT

    Liang Kou1, Yiqi Shi2, Liguo Zhang1, Duo Liu1,*, Qing Yang3

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 545-565, 2019, DOI:10.32604/cmc.2019.03760

    Abstract With the development of computer hardware technology and network technology, the Internet of Things as the extension and expansion of traditional computing network has played an increasingly important role in all professions and trades and has had a tremendous impact on people lifestyle. The information perception of the Internet of Things plays a key role as a link between the computer world and the real world. However, there are potential security threats in the Perceptual Layer Network applied for information perception because Perceptual Layer Network consists of a large number of sensor nodes with weak computing power, limited power supply,… More >

  • Open Access

    ARTICLE

    A Novel Ensemble Learning Algorithm Based on D-S Evidence Theory for IoT Security

    Changting Shi1, *

    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 635-652, 2018, DOI:10.32604/cmc.2018.03754

    Abstract In the last decade, IoT has been widely used in smart cities, autonomous driving and Industry 4.0, which lead to improve efficiency, reliability, security and economic benefits. However, with the rapid development of new technologies, such as cognitive communication, cloud computing, quantum computing and big data, the IoT security is being confronted with a series of new threats and challenges. IoT device identification via Radio Frequency Fingerprinting (RFF) extracting from radio signals is a physical-layer method for IoT security. In physical-layer, RFF is a unique characteristic of IoT device themselves, which can difficultly be tampered. Just as people’s unique fingerprinting,… More >

  • Open Access

    ARTICLE

    A Fuzzy Approach for an IoT-based Automated Employee Performance Appraisal

    Jaideep Kaur1, Kamaljit Kaur2

    CMC-Computers, Materials & Continua, Vol.53, No.1, pp. 23-36, 2017, DOI:10.3970/cmc.2017.053.024

    Abstract The ubiquitous Internet of Things (IoT) through RFIDs, GPS, NFC and other wireless devices is capable of sensing the activities being carried around Industrial environment so as to automate industrial processes. In almost every industry, employee performance appraisal is done manually which may lead to favoritisms. This paper proposes a framework to perform automatic employee performance appraisal based on data sensed from IoT. The framework classifies raw IoT data into three activities (Positive, Negative, Neutral), co-locates employee and activity in order to calculate employee implication and then performs cognitive decision making using fuzzy logic. From the experiments carried out it… More >

Displaying 671-680 on page 68 of 680. Per Page