Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (685)
  • Open Access

    ARTICLE

    An Ingenious IoT Based Crop Prediction System Using ML and EL

    Shabana Ramzan1, Yazeed Yasin Ghadi2, Hanan Aljuaid3, Aqsa Mahmood1,*, Basharat Ali4

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 183-199, 2024, DOI:10.32604/cmc.2024.047603

    Abstract Traditional farming procedures are time-consuming and expensive as based on manual labor. Farmers have no proper knowledge to select which crop is suitable to grow according to the environmental factors and soil characteristics. This is the main reason for the low yield of crops and the economic crisis in the agricultural sector of the different countries. The use of modern technologies such as the Internet of Things (IoT), machine learning, and ensemble learning can facilitate farmers to observe different factors such as soil electrical conductivity (EC), and environmental factors like temperature to improve crop yield. These parameters play a vital… More >

  • Open Access

    ARTICLE

    ResNeSt-biGRU: An Intrusion Detection Model Based on Internet of Things

    Yan Xiang1,2, Daofeng Li1,2,*, Xinyi Meng1,2, Chengfeng Dong1,2, Guanglin Qin1,2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1005-1023, 2024, DOI:10.32604/cmc.2024.047143

    Abstract The rapid expansion of Internet of Things (IoT) devices across various sectors is driven by steadily increasing demands for interconnected and smart technologies. Nevertheless, the surge in the number of IoT device has caught the attention of cyber hackers, as it provides them with expanded avenues to access valuable data. This has resulted in a myriad of security challenges, including information leakage, malware propagation, and financial loss, among others. Consequently, developing an intrusion detection system to identify both active and potential intrusion traffic in IoT networks is of paramount importance. In this paper, we propose ResNeSt-biGRU, a practical intrusion detection… More >

  • Open Access

    ARTICLE

    Chitosan/PVA Films and Silver Nanoparticle Impregnated Nanofibrous Dressings for Evaluation of their Wound Healing Efficacy in Wistar Albino Rat Model

    SOBHA KOTA*, RATNAKUMARI ANANTHA, VAYUNANDANA RAO GOVADA, PRADEEP DUMPALA

    Journal of Polymer Materials, Vol.40, No.3-4, pp. 285-303, 2023, DOI:10.32381/JPM.2023.40.3-4.10

    Abstract The exoskeleton of marine shrimp contains a natural, biocompatible polymer chitin, which is dumped as a waste. The study proposes the sustainable single-pot-extraction of chitosan from the waste and its use in the fabrication of wound-dressings, and thus leverage its piezoelectric, antioxidant, hypoglycaemic and medicinal properties in wound-healing. The Fourier transform infrared spectrum revealed that marine chitosan contains functional groups with N-O, O-H, and CO stretching. Scanning electron micrographs demonstrated the spherical and mesoporous structures of the extracted chitosan. X-ray diffraction analysis showed a semi-crystalline phase of chitosan particles with a mean size of 28.9 nm. The film prepared with… More >

  • Open Access

    ARTICLE

    Study on Organic Fluorine Modified Cationic Acrylic Resin and its Application in Cathodic Electrodeposition Coatings

    LIJUN CHEN*, ZHEQING GONG, ZHENGRONG FU

    Journal of Polymer Materials, Vol.40, No.3-4, pp. 157-164, 2023, DOI:10.32381/JPM.2023.40.3-4.3

    Abstract The organic fluorine modified/containing cationic acrylic resin is prepared via solution polymerization technique using hexafluorobutyl methacrylate (HFMA) along with butyl acrylate (BA), methyl methacrylate (MMA), styrene (St), dimethylaminoethyl methacrylate (DMAEMA) and hydroxy propyl methacrylate (HPMA) as the comonomers, proprylene glycol monomethyl ether (PGME) as the solvent, and 2, 2-Azo-bis-iso-butyronitrile (AIBN) as the initiator. The synthesized resin in which fluorine atom is introduced into the polymer chains. The cathodic electrodeposition (CED) coatings were prepared by mixing the synthesized resin and blocked isocyanate. The influence of the amount of organic fluorine on the resin and the resultant CED coatings is investigated in… More >

  • Open Access

    ARTICLE

    Phenolic Profile and Volatiles of in vitro Propagated Lavandula angustifolia Mill. Seedlings

    Mir Abdullatif Yahya1, Fatma Tunali1, Dilek Killi2,*, Atalay Sökmen2

    Phyton-International Journal of Experimental Botany, Vol.93, No.3, pp. 427-444, 2024, DOI:10.32604/phyton.2024.046271

    Abstract An effective in vitro propagation protocol was designed for Lavandula angustifolia Miller, a medicinal aromatic plant that is a prominent source of volatile organic compounds (VOCs). Murashige and Skoog media were supplemented with various concentrations of Plant Growth Regulators (PGRs), and the growth parameters of the nodal segments were examined. Nodal explants formed callus when they were supplemented with 2 mg/L of 6-Benzylaminopurine (BAP). The superior hormonal concentration of Murashige and Skoog (MS) media for the proliferation of shoots from callus cultures (39.33%) was 5 mg/L of 2-Isopentenyl adenine (2iP), and the favorable media for the growth of L. angustifoliaMore >

  • Open Access

    ARTICLE

    A Hybrid and Lightweight Device-to-Server Authentication Technique for the Internet of Things

    Shaha Al-Otaibi1, Rahim Khan2,*, Hashim Ali2, Aftab Ahmed Khan2, Amir Saeed3, Jehad Ali4,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3805-3823, 2024, DOI:10.32604/cmc.2024.049017

    Abstract The Internet of Things (IoT) is a smart networking infrastructure of physical devices, i.e., things, that are embedded with sensors, actuators, software, and other technologies, to connect and share data with the respective server module. Although IoTs are cornerstones in different application domains, the device’s authenticity, i.e., of server(s) and ordinary devices, is the most crucial issue and must be resolved on a priority basis. Therefore, various field-proven methodologies were presented to streamline the verification process of the communicating devices; however, location-aware authentication has not been reported as per our knowledge, which is a crucial metric, especially in scenarios where… More >

  • Open Access

    ARTICLE

    A Security Trade-Off Scheme of Anomaly Detection System in IoT to Defend against Data-Tampering Attacks

    Bing Liu1, Zhe Zhang1, Shengrong Hu2, Song Sun3,*, Dapeng Liu4, Zhenyu Qiu5

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4049-4069, 2024, DOI:10.32604/cmc.2024.048099

    Abstract Internet of Things (IoT) is vulnerable to data-tampering (DT) attacks. Due to resource limitations, many anomaly detection systems (ADSs) for IoT have high false positive rates when detecting DT attacks. This leads to the misreporting of normal data, which will impact the normal operation of IoT. To mitigate the impact caused by the high false positive rate of ADS, this paper proposes an ADS management scheme for clustered IoT. First, we model the data transmission and anomaly detection in clustered IoT. Then, the operation strategy of the clustered IoT is formulated as the running probabilities of all ADSs deployed on… More >

  • Open Access

    ARTICLE

    RL and AHP-Based Multi-Timescale Multi-Clock Source Time Synchronization for Distribution Power Internet of Things

    Jiangang Lu, Ruifeng Zhao*, Zhiwen Yu, Yue Dai, Kaiwen Zeng

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4453-4469, 2024, DOI:10.32604/cmc.2024.048020

    Abstract Time synchronization (TS) is crucial for ensuring the secure and reliable functioning of the distribution power Internet of Things (IoT). Multi-clock source time synchronization (MTS) has significant advantages of high reliability and accuracy but still faces challenges such as optimization of the multi-clock source selection and the clock source weight calculation at different timescales, and the coupling of synchronization latency jitter and pulse phase difference. In this paper, the multi-timescale MTS model is conducted, and the reinforcement learning (RL) and analytic hierarchy process (AHP)-based multi-timescale MTS algorithm is designed to improve the weighted summation of synchronization latency jitter standard deviation… More >

  • Open Access

    ARTICLE

    Deep Learning-Based Secure Transmission Strategy with Sensor-Transmission-Computing Linkage for Power Internet of Things

    Bin Li*, Linghui Kong, Xiangyi Zhang, Bochuo Kou, Hui Yu, Bowen Liu

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3267-3282, 2024, DOI:10.32604/cmc.2024.047193

    Abstract The automatic collection of power grid situation information, along with real-time multimedia interaction between the front and back ends during the accident handling process, has generated a massive amount of power grid data. While wireless communication offers a convenient channel for grid terminal access and data transmission, it is important to note that the bandwidth of wireless communication is limited. Additionally, the broadcast nature of wireless transmission raises concerns about the potential for unauthorized eavesdropping during data transmission. To address these challenges and achieve reliable, secure, and real-time transmission of power grid data, an intelligent security transmission strategy with sensor-transmission-computing… More >

  • Open Access

    ARTICLE

    Intelligent Fault Diagnosis Method of Rolling Bearings Based on Transfer Residual Swin Transformer with Shifted Windows

    Haomiao Wang1, Jinxi Wang2, Qingmei Sui2,*, Faye Zhang2, Yibin Li1, Mingshun Jiang2, Phanasindh Paitekul3

    Structural Durability & Health Monitoring, Vol.18, No.2, pp. 91-110, 2024, DOI:10.32604/sdhm.2023.041522

    Abstract Due to their robust learning and expression ability for complex features, the deep learning (DL) model plays a vital role in bearing fault diagnosis. However, since there are fewer labeled samples in fault diagnosis, the depth of DL models in fault diagnosis is generally shallower than that of DL models in other fields, which limits the diagnostic performance. To solve this problem, a novel transfer residual Swin Transformer (RST) is proposed for rolling bearings in this paper. RST has 24 residual self-attention layers, which use the hierarchical design and the shifted window-based residual self-attention. Combined with transfer learning techniques, the… More >

Displaying 11-20 on page 2 of 685. Per Page