Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (530)
  • Open Access

    ARTICLE

    Middleware for Internet of Things: Survey and Challenges

    Samia Allaoua Chellouga, Mohamed A. El-Zawawyb,c

    Intelligent Automation & Soft Computing, Vol.24, No.2, pp. 309-318, 2018, DOI:10.1080/10798587.2017.1290328

    Abstract The Internet of things (IoT) applications span many potential fields. Furthermore, smart homes, smart cities, smart vehicular networks, and healthcare are very attractive and intelligent applications. In most of these applications, the system consists of smart objects that are equipped by sensors and Radio Frequency Identification (RFID) and may rely on other technological computing and paradigm solutions such as M2 M (machine to machine) computing, Wifi, Wimax, LTE, cloud computing, etc. Thus, the IoT vision foresees that we can shift from traditional sensor networks to pervasive systems, which deliver intelligent automation by running services on objects. Actually, a significant attention has… More >

  • Open Access

    ARTICLE

    A Hot Event Influence Scope Assessment Method in Cyber-Physical Space For Big Data Application

    Yunlan Xuea, Lingyu Xub, Jie Yub, Gaowei Zhangb

    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 97-106, 2018, DOI:10.1080/10798587.2016.1267247

    Abstract The increase of scale and complexity of Internet big data presents unprecedented opportunities on Cyber-Physical Systems (CPS). The incompleteness and incredibility of Internet big data are challenging issues for confirming the event influence scope. To solve the above problem, we propose CyberPhysical Space Event Model (CPSEM) to analyze event influence in multi-viewer, which maps real data into Cyber Space (CS) and Physical Space (PS). In addition, we propose Event Influence Scope Detection Algorithm (EISDA) to detect the scope of a hot event in Cyber Space and Physical Space. More >

  • Open Access

    ARTICLE

    Realization of Internet of Things Smart Appliances

    Jia‐Shing Sheua, I‐Chen Chenb, Yi‐Syong Liaoa

    Intelligent Automation & Soft Computing, Vol.25, No.2, pp. 395-404, 2019, DOI:10.31209/2019.100000101

    Abstract This study proposed a household energy state monitoring system (HESMS) and a household energy load monitoring system (HELMS) for monitoring smart appliances. The HESMS applies reinforcement learning to receive changes in the external environment and the state of an electrical appliance, determines if the electrical appliance should be turned on, and controls the signals sent to the HELMS according to these decisions. The HELMS implements an ON/OFF control mechanism for household appliances according to the control signals and the power consumption state. The proposed systems are based on the wireless communication network and can monitor household appliances’ energy usage, control… More >

  • Open Access

    ARTICLE

    Trust Provision in the Internet of Things Using Transversal Blockchain Networks

    Borja Bordela, Ramon Alcarriab, Diego Martína, Álvaro Sánchez-Picota

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 155-170, 2019, DOI:10.31209/2018.100000052

    Abstract The Internet-of-Things (IoT) paradigm faces new and genuine challenges and problems associated, mainly, with the ubiquitous access to the Internet, the huge number of devices involved and the heterogeneity of the components making up this new global network. In this context, protecting these systems against cyberattacks and cybercrimes has turn into a basic issue. In relation to this topic, most proposed solutions in the literature are focused on security; however other aspects have to be considered (such as privacy or trust). Therefore, in this paper we define a theoretical framework for trust in IoT scenarios, including a mathematical formalization and… More >

  • Open Access

    ARTICLE

    Deep Learning-Based Intrusion System for Vehicular Ad Hoc Networks

    Fei Li1, *, Jiayan Zhang1, Edward Szczerbicki2, Jiaqi Song1, Ruxiang Li 1, Renhong Diao1

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 653-681, 2020, DOI:10.32604/cmc.2020.011264

    Abstract The increasing use of the Internet with vehicles has made travel more convenient. However, hackers can attack intelligent vehicles through various technical loopholes, resulting in a range of security issues. Due to these security issues, the safety protection technology of the in-vehicle system has become a focus of research. Using the advanced autoencoder network and recurrent neural network in deep learning, we investigated the intrusion detection system based on the in-vehicle system. We combined two algorithms to realize the efficient learning of the vehicle’s boundary behavior and the detection of intrusive behavior. In order to verify the accuracy and efficiency… More >

  • Open Access

    ARTICLE

    Behavioral Feature and Correlative Detection of Multiple Types of Node in the Internet of Vehicles

    Pengshou Xie1, Guoqiang Ma1, *, Tao Feng1, Yan Yan1, 2, Xueming Han1

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1127-1137, 2020, DOI:10.32604/cmc.2020.09695

    Abstract Undoubtedly, uncooperative or malicious nodes threaten the safety of Internet of Vehicles (IoV) by destroying routing or data. To this end, some researchers have designed some node detection mechanisms and trust calculating algorithms based on some different feature parameters of IoV such as communication, data, energy, etc., to detect and evaluate vehicle nodes. However, it is difficult to effectively assess the trust level of a vehicle node only by message forwarding, data consistency, and energy sufficiency. In order to resolve these problems, a novel mechanism and a new trust calculating model is proposed in this paper. First, the four tuple… More >

  • Open Access

    ARTICLE

    A Distributed Approach of Big Data Mining for Financial Fraud Detection in a Supply Chain

    Hangjun Zhou1, *, Guang Sun1, 2, Sha Fu1, Xiaoping Fan1, Wangdong Jiang1, Shuting Hu1, Lingjiao Li1

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1091-1105, 2020, DOI:10.32604/cmc.2020.09834

    Abstract Supply Chain Finance (SCF) is important for improving the effectiveness of supply chain capital operations and reducing the overall management cost of a supply chain. In recent years, with the deep integration of supply chain and Internet, Big Data, Artificial Intelligence, Internet of Things, Blockchain, etc., the efficiency of supply chain financial services can be greatly promoted through building more customized risk pricing models and conducting more rigorous investment decision-making processes. However, with the rapid development of new technologies, the SCF data has been massively increased and new financial fraud behaviors or patterns are becoming more covertly scattered among normal… More >

  • Open Access

    ARTICLE

    Anomaly IoT Node Detection Based on Local Outlier Factor and Time Series

    Fang Wang1, *, Zhe Wei1, Xu Zuo2

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1063-1073, 2020, DOI:10.32604/cmc.2020.09774

    Abstract The heterogeneous nodes in the Internet of Things (IoT) are relatively weak in the computing power and storage capacity. Therefore, traditional algorithms of network security are not suitable for the IoT. Once these nodes alternate between normal behavior and anomaly behavior, it is difficult to identify and isolate them by the network system in a short time, thus the data transmission accuracy and the integrity of the network function will be affected negatively. Based on the characteristics of IoT, a lightweight local outlier factor detection method is used for node detection. In order to further determine whether the nodes are… More >

  • Open Access

    ARTICLE

    Privacy Protection Algorithm for the Internet of Vehicles Based on Local Differential Privacy and Game Model

    Wenxi Han1, 2, Mingzhi Cheng3, *, Min Lei1, 2, Hanwen Xu2, Yu Yang1, 2, Lei Qian4

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1025-1038, 2020, DOI:10.32604/cmc.2020.09815

    Abstract In recent years, with the continuous advancement of the intelligent process of the Internet of Vehicles (IoV), the problem of privacy leakage in IoV has become increasingly prominent. The research on the privacy protection of the IoV has become the focus of the society. This paper analyzes the advantages and disadvantages of the existing location privacy protection system structure and algorithms, proposes a privacy protection system structure based on untrusted data collection server, and designs a vehicle location acquisition algorithm based on a local differential privacy and game model. The algorithm first meshes the road network space. Then, the dynamic… More >

  • Open Access

    ARTICLE

    An Alias Resolution Method Based on Delay Sequence Analysis

    Yang Tao1, Gang Hu1, Bingnan Hou1, Zhiping Cai1, *, Jing Xia1, Cheang Chak Fong2

    CMC-Computers, Materials & Continua, Vol.63, No.3, pp. 1433-1443, 2020, DOI:10.32604/cmc.2020.09850

    Abstract Alias resolution, mapping IP addresses to routers, is a critical step in obtaining a network topology. The latest work on alias resolution is based on special fields in the packet, such as IP ID, port number, etc. However, for security reasons, most network devices block packets for setting options, and some related fields exist only in IPv4, so these methods cannot be used for alias resolution of IPv6. In order to solve the above problems, we propose an alias analysis method based on delay sequence analysis. In this article, we present a new model to describe the distribution of Internet… More >

Displaying 501-510 on page 51 of 530. Per Page