Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (538)
  • Open Access

    ARTICLE

    Robust Attack Detection Approach for IIoT Using Ensemble Classifier

    V. Priya1, I. Sumaiya Thaseen1, Thippa Reddy Gadekallu1, Mohamed K. Aboudaif2,*, Emad Abouel Nasr3

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2457-2470, 2021, DOI:10.32604/cmc.2021.013852

    Abstract Generally, the risks associated with malicious threats are increasing for the Internet of Things (IoT) and its related applications due to dependency on the Internet and the minimal resource availability of IoT devices. Thus, anomaly-based intrusion detection models for IoT networks are vital. Distinct detection methodologies need to be developed for the Industrial Internet of Things (IIoT) network as threat detection is a significant expectation of stakeholders. Machine learning approaches are considered to be evolving techniques that learn with experience, and such approaches have resulted in superior performance in various applications, such as pattern recognition, outlier analysis, and speech recognition.… More >

  • Open Access

    ARTICLE

    Proposing a High-Robust Approach for Detecting the Tampering Attacks on English Text Transmitted via Internet

    Fahd N. Al-Wesabi1,*, Huda G. Iskandar2, Mohammad Alamgeer3, Mokhtar M. Ghilan2

    Intelligent Automation & Soft Computing, Vol.26, No.6, pp. 1267-1283, 2020, DOI:10.32604/iasc.2020.013782

    Abstract In this paper, a robust approach INLPETWA (an Intelligent Natural Language Processing and English Text Watermarking Approach) is proposed to tampering detection of English text by integrating zero text watermarking and hidden Markov model as a soft computing and natural language processing techniques. In the INLPETWA approach, embedding and detecting the watermark key logically conducted without altering the plain text. Second-gram and word mechanism of hidden Markov model is used as a natural text analysis technique to extracts English text features and use them as a watermark key and embed them logically and validates them during detection process to detect… More >

  • Open Access

    ARTICLE

    Internet of Things Enabled Intelligent Energy Management and Control System for Heavy Equipment Industrial Park and Fuzzy Assessment of Its Schemes

    Jia Zhu*

    Energy Engineering, Vol.118, No.2, pp. 379-397, 2021, DOI:10.32604/EE.2021.014178

    Abstract In order to solve the problems of poor information flow, low energy utilization rate and energy consumption data reuse in the heavy equipment industrial park, the Internet of Things (IoT) technology is applied to construct the intelligent energy management and control system (IEMCS). The application architecture and function module planning are analyzed and designed. Furthermore, the IEMCS scheme is not unique due to the fuzziness of customer demand and the understanding deviation of designer to customer demand in the design stage. Scheme assessment is of great significance for the normal subsequent implementation of the system. A fuzzy assessment method for… More >

  • Open Access

    ARTICLE

    Data Security Storage Model of the Internet of Things Based on Blockchain

    Pingshui Wang1,2,*, Willy Susilo2

    Computer Systems Science and Engineering, Vol.36, No.1, pp. 213-224, 2021, DOI:10.32604/csse.2021.014541

    Abstract With the development of information technology, the Internet of Things (IoT) has gradually become the third wave of the worldwide information industry revolution after the computer and the Internet. The application of the IoT has brought great convenience to people’s production and life. However, the potential information security problems in various IoT applications are gradually exposed and people pay more attention to them. The traditional centralized data storage and management model of the IoT is easy to cause transmission delay, single point of failure, privacy disclosure and other problems, and eventually leads to unpredictable behavior of the system. Blockchain technology… More >

  • Open Access

    ARTICLE

    A Model Transformation Approach for Detecting Distancing Violations in Weighted Graphs

    Ahmad F. Subahi*

    Computer Systems Science and Engineering, Vol.36, No.1, pp. 13-39, 2021, DOI:10.32604/csse.2021.014376

    Abstract This work presents the design of an Internet of Things (IoT) edge-based system based on model transformation and complete weighted graph to detect violations of social distancing measures in indoor public places. A wireless sensor network based on Bluetooth Low Energy is introduced as the infrastructure of the proposed design. A hybrid model transformation strategy for generating a graph database to represent groups of people is presented as a core middleware layer of the detecting system’s proposed architectural design. A Neo4j graph database is used as a target implementation generated from the proposed transformational system to store all captured real-time… More >

  • Open Access

    ARTICLE

    Monitoring of Unaccounted for Gas in Energy Domain Using Semantic Web Technologies

    Kausar Parveen1,*, Ghalib A. Shah2, Muhammad Aslam3, Amjad Farooq3

    Computer Systems Science and Engineering, Vol.36, No.1, pp. 41-56, 2021, DOI:10.32604/csse.2021.013787

    Abstract Smart Urbanization has increased tremendously over the last few years, and this has exacerbated problems in all areas of life, especially in the energy sector. The Internet of Things (IoT) is providing effective solutions in gas distribution, transmission and billing through very sophisticated sensory devices and software. Billions of heterogeneous devices link to each other in smart urbanization, and this has led to the Semantic interoperability (SI) problem between the connected devices. In the energy field, such as electricity and gas, several devices are interlinked. These devices are competent for their specific operational role but unable to communicate across the… More >

  • Open Access

    ARTICLE

    Blockchain-Based Data Storage Mechanism for Industrial Internet of Things

    Jin Wang1,2, Wencheng Chen1, Lei Wang3, Yongjun Ren4,*, R. Simon Sherratt5

    Intelligent Automation & Soft Computing, Vol.26, No.5, pp. 1157-1172, 2020, DOI:10.32604/iasc.2020.012174

    Abstract With the development of the Industrial Internet of Things and the continuous expansion of application scenarios, many development bottlenecks have followed. Its data security issue has become an obstacle to its widespread application. It has attracted substantial attention from both academia and industry. Blockchain technology has the characteristics of decentralization, openness and transparency and non-tampering. It has natural advantages in solving the security of the Industrial Internet of Things. Accordingly, this paper first analyzes the security risks associated with data storage in the Industrial Internet of Things and proposes the use of blockchain technology to ensure the secure storage of… More >

  • Open Access

    ARTICLE

    Internet of Things in Healthcare: Architecture, Applications, Challenges, and Solutions

    Vankamamidi S. Naresh1,∗,†, Suryateja S. Pericherla2,‡, Pilla Sita Rama Murty3,§, Sivaranjani Reddi4,¶

    Computer Systems Science and Engineering, Vol.35, No.6, pp. 411-421, 2020, DOI:10.32604/csse.2020.35.411

    Abstract Healthcare, the largest global industry, is undergoing significant transformations with the genesis of a new technology known as the Internet of Things (IoT). Many healthcare leaders are investing more money for transforming their services to harness the benefits provided by IoT, thereby paving the way for the Internet of Medical Things (IoMT), an extensive collection of medical sensors and associated infrastructure. IoMT has many benefits like providing remote healthcare by monitoring health vitals of patients at a distant place, providing healthcare services to elderly people, and monitoring a large group of people in a region or country for detection and… More >

  • Open Access

    ARTICLE

    IoT Technologies for Tackling COVID-19 in Malaysia and Worldwide: Challenges, Recommendations, and Proposed Framework

    Ali Saadon Al-Ogaili1,*, Ameer Alhasan2, Agileswari Ramasamy1, Marayati Binti Marsadek1, Tengku Juhana Tengku Hashim1, Ammar Al-Sharaa3, Mastura Binti Aadam3, Lukman Audah2

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 2141-2164, 2021, DOI:10.32604/cmc.2020.013440

    Abstract The Coronavirus (COVID-19) pandemic is considered as a global public health challenge. To contain this pandemic, different measures are being taken globally. The Internet of Things (IoT) has been represented as one of the most important schemes that has been considered to fight the spread of COVID-19 in the world, practically Malaysia. In fact, there are many sectors in Malaysia would be transformed into smart services by using IoT technologies, particularly energy, transportation, healthcare sectors. This manuscript presents a comprehensive review of the IoT technologies that are being used currently in Malaysia to accelerate the measures against COVID-19. These IoT… More >

  • Open Access

    ARTICLE

    Memetic Optimization with Cryptographic Encryption for Secure Medical Data Transmission in IoT-Based Distributed Systems

    Srinath Doss1, Jothi Paranthaman2, Suseendran Gopalakrishnan3, Akila Duraisamy3, Souvik Pal4, Balaganesh Duraisamy5, Chung Le Van6,*, Dac-Nhuong Le7

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1577-1594, 2021, DOI:10.32604/cmc.2020.012379

    Abstract In the healthcare system, the Internet of Things (IoT) based distributed systems play a vital role in transferring the medical-related documents and information among the organizations to reduce the replication in medical tests. This datum is sensitive, and hence security is a must in transforming the sensational contents. In this paper, an Evolutionary Algorithm, namely the Memetic Algorithm is used for encrypting the text messages. The encrypted information is then inserted into the medical images using Discrete Wavelet Transform 1 level and 2 levels. The reverse method of the Memetic Algorithm is implemented when extracting a hidden message from the… More >

Displaying 481-490 on page 49 of 538. Per Page