Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (214)
  • Open Access

    REVIEW

    Recent Developments in Authentication Schemes Used in Machine-Type Communication Devices in Machine-to-Machine Communication: Issues and Challenges

    Shafi Ullah1, Sibghat Ullah Bazai1,*, Mohammad Imran2, Qazi Mudassar Ilyas3,*, Abid Mehmood4, Muhammad Asim Saleem5, Muhmmad Aasim Rafique3, Arsalan Haider6, Ilyas Khan7, Sajid Iqbal3, Yonis Gulzar4, Kauser Hameed3

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 93-115, 2024, DOI:10.32604/cmc.2024.048796

    Abstract Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices (MTCDs) regularly share extensive data without human intervention while making all types of decisions. These decisions may involve controlling sensitive ventilation systems maintaining uniform temperature, live heartbeat monitoring, and several different alert systems. Many of these devices simultaneously share data to form an automated system. The data shared between machine-type communication devices (MTCDs) is prone to risk due to limited computational power, internal memory, and energy capacity. Therefore, securing the data and devices becomes challenging… More >

  • Open Access

    ARTICLE

    Time and Space Efficient Multi-Model Convolution Vision Transformer for Tomato Disease Detection from Leaf Images with Varied Backgrounds

    Ankita Gangwar1, Vijaypal Singh Dhaka1, Geeta Rani2,*, Shrey Khandelwal1, Ester Zumpano3,4, Eugenio Vocaturo3,4

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 117-142, 2024, DOI:10.32604/cmc.2024.048119

    Abstract A consumption of 46.9 million tons of processed tomatoes was reported in 2022 which is merely 20% of the total consumption. An increase of 3.3% in consumption is predicted from 2024 to 2032. Tomatoes are also rich in iron, potassium, antioxidant lycopene, vitamins A, C and K which are important for preventing cancer, and maintaining blood pressure and glucose levels. Thus, tomatoes are globally important due to their widespread usage and nutritional value. To face the high demand for tomatoes, it is mandatory to investigate the causes of crop loss and minimize them. Diseases are one of the major causes… More >

  • Open Access

    REVIEW

    Mini Review on PEDOT:PSS as a Conducting Material in Energy Harvesting and Storage Devices Applications

    HYUNGSUB YOONa,*, HEEBO HAa, CHUNGHYEON CHOIa, TAE GWANG YUNb, BYUNGIL HWANGa

    Journal of Polymer Materials, Vol.40, No.1-2, pp. 1-17, 2023, DOI:10.32381/JPM.2023.40.1-2.1

    Abstract Poly(3,4-ethylenedioxythiophene):polystyrene sulfonate (PEDOT:PSS), one of the conducting polymers, is widely used as a conducting material in various applications. PEDOT:PSS possesses high electrical conductivity, optical transparency in visible light range, good chemical and physical stability in ambient state, etc. Furthermore, PEDOT:PSS offers the advantages of flexibility and possibility of solution-based process, which makes it suitable for use in flexible electronic devices. In this mini review, the applications of PEDOT:PSS as a conductive parts in energy harvesting and storage technologies are discussed and summarized. More >

  • Open Access

    ARTICLE

    A Hybrid and Lightweight Device-to-Server Authentication Technique for the Internet of Things

    Shaha Al-Otaibi1, Rahim Khan2,*, Hashim Ali2, Aftab Ahmed Khan2, Amir Saeed3, Jehad Ali4,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3805-3823, 2024, DOI:10.32604/cmc.2024.049017

    Abstract The Internet of Things (IoT) is a smart networking infrastructure of physical devices, i.e., things, that are embedded with sensors, actuators, software, and other technologies, to connect and share data with the respective server module. Although IoTs are cornerstones in different application domains, the device’s authenticity, i.e., of server(s) and ordinary devices, is the most crucial issue and must be resolved on a priority basis. Therefore, various field-proven methodologies were presented to streamline the verification process of the communicating devices; however, location-aware authentication has not been reported as per our knowledge, which is a crucial metric, especially in scenarios where… More >

  • Open Access

    ARTICLE

    A Framework for Enhancing Privacy and Anonymity in Blockchain-Enabled IoT Devices

    Muhammad Saad1, Muhammad Raheel Bhutta2, Jongik Kim3,*, Tae-Sun Chung1

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4263-4282, 2024, DOI:10.32604/cmc.2024.047132

    Abstract With the increase in IoT (Internet of Things) devices comes an inherent challenge of security. In the world today, privacy is the prime concern of every individual. Preserving one’s privacy and keeping anonymity throughout the system is a desired functionality that does not come without inevitable trade-offs like scalability and increased complexity and is always exceedingly difficult to manage. The challenge is keeping confidentiality and continuing to make the person innominate throughout the system. To address this, we present our proposed architecture where we manage IoT devices using blockchain technology. Our proposed architecture works on and off blockchain integrated with… More >

  • Open Access

    ARTICLE

    ENERGY EFFECTIVENESS OF SIMULTANEOUS HEAT AND MASS EXCHANGE DEVICES

    G. Prakash Narayana, Karan H. Mistrya, Mostafa H. Sharqawya, Syed M. Zubairb, John H. Lienhard Va,†

    Frontiers in Heat and Mass Transfer, Vol.1, No.2, pp. 1-13, 2010, DOI:10.5098/hmt.v1.2.3001

    Abstract Simultaneous heat and mass exchange devices such as cooling towers, humidifiers and dehumidifiers are widely used in the power generation, desalination, air conditioning, and refrigeration industries. For design and rating of these components it is useful to define their performance by an effectiveness. In this paper, several different effectiveness definitions that have been used in literature are critically reviewed and an energy based effectiveness which can be applied to all types of heat and mass exchangers is defined. The validity and the limitations of the various effectiveness definitions are demonstrated by way of several examples including direct and indirect contact,… More >

  • Open Access

    ARTICLE

    NUMERICAL INVESTIGATION OF NON-NEWTONIAN FLOW AND HEAT TRANSFER IN TUBES OF HEAT EXCHANGERS WITH RECIPROCATING INSERT DEVICES*

    D. S. Martínez, J. P. Solano, J. Pérez, A. Viedma

    Frontiers in Heat and Mass Transfer, Vol.2, No.3, pp. 1-10, 2011, DOI:10.5098/hmt.v2.3.3002

    Abstract Non-Newtonian flow and heat transfer in tubes of heat exchangers with reciprocating insert devices have been numerically investigated. The heat exchanger is mechanically assisted by a reciprocating cylinder, which moves the scraping rods inserted in the tubes. An array of semi-circular elements is mounted on each rod, with a pitch p=5D. These elements fit the internal diameter of the tubes. During the reciprocating motion, they scrape the inner tube wall, avoiding fouling. Additionally, the movement of the inserted device generates macroscopic displacements of the flow, which continuously mix core regions with peripheral flow. A power law model with temperature dependent… More >

  • Open Access

    ARTICLE

    GestureID: Gesture-Based User Authentication on Smart Devices Using Acoustic Sensing

    Jizhao Liu1,2, Jiang Hui1,2,*, Zhaofa Wang1,2

    Sound & Vibration, Vol.58, pp. 151-169, 2024, DOI:10.32604/sv.2024.045193

    Abstract User authentication on smart devices is crucial to protecting user privacy and device security. Due to the development of emerging attacks, existing physiological feature-based authentication methods, such as fingerprint, iris, and face recognition are vulnerable to forgery and attacks. In this paper, GestureID, a system that utilizes acoustic sensing technology to distinguish hand features among users, is proposed. It involves using a speaker to send acoustic signals and a microphone to receive the echoes affected by the reflection of the hand movements of the users. To ensure system accuracy and effectively distinguish users’ gestures, a second-order differential-based phase extraction method… More >

  • Open Access

    REVIEW

    A Review of the Tuned Mass Damper Inerter (TMDI) in Energy Harvesting and Vibration Control: Designs, Analysis and Applications

    Xiaofang Kang1,2,*, Qiwen Huang1, Zongqin Wu1, Jianjun Tang1, Xueqin Jiang1, Shancheng Lei3

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 2361-2398, 2024, DOI:10.32604/cmes.2023.043936

    Abstract Tuned mass damper inerter (TMDI) is a device that couples traditional tuned mass dampers (TMD) with an inertial device. The inertial device produces resistance proportional to the relative acceleration at its two ends through its “inertial” constant. Due to its unique mechanical properties, TMDI has received widespread attention and application in the past twenty years. As different configurations are required in different practical situations, TMDI is still active in the research on vibration control and energy harvesting in structures. This paper provides a comprehensive review of the research status of TMDI. This work first examines the generation and important vibration… More >

  • Open Access

    ARTICLE

    IoT Smart Devices Risk Assessment Model Using Fuzzy Logic and PSO

    Ashraf S. Mashaleh1,2,*, Noor Farizah Binti Ibrahim1, Mohammad Alauthman3, Mohammad Almseidin4, Amjad Gawanmeh5

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2245-2267, 2024, DOI:10.32604/cmc.2023.047323

    Abstract Increasing Internet of Things (IoT) device connectivity makes botnet attacks more dangerous, carrying catastrophic hazards. As IoT botnets evolve, their dynamic and multifaceted nature hampers conventional detection methods. This paper proposes a risk assessment framework based on fuzzy logic and Particle Swarm Optimization (PSO) to address the risks associated with IoT botnets. Fuzzy logic addresses IoT threat uncertainties and ambiguities methodically. Fuzzy component settings are optimized using PSO to improve accuracy. The methodology allows for more complex thinking by transitioning from binary to continuous assessment. Instead of expert inputs, PSO data-driven tunes rules and membership functions. This study presents a… More >

Displaying 1-10 on page 1 of 214. Per Page