Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (530)
  • Open Access

    ARTICLE

    Energy Efficiency in Internet of Things: An Overview

    Wuxiong Zhang1, 2, Weidong Fang1, 2, *, Qianqian Zhao1, 2, Xiaohong Ji3, Guoqing Jia3

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 787-811, 2020, DOI:10.32604/cmc.2020.07620

    Abstract Energy efficiency is very important for the Internet of Things (IoT), especially for front-end sensed terminal or node. It not only embodies the node’s life, but also reflects the lifetime of the network. Meanwhile, it is also a key indicator of green communications. Unfortunately, there is no article on systematic analysis and review for energy efficiency evaluation in IoT. In this paper, we systemically analyze the architecture of IoT, and point out its energy distribution, Furthermore, we summarized the energy consumption model in IoT, analyzed the pros and cons of improving energy efficiency, presented a state of the art the… More >

  • Open Access

    ARTICLE

    Mobile Internet Mobile Agent System Dynamic Trust Model for Cloud Computing

    Weijin Jiang1, 2, 3, Yang Wang1,*, Yirong Jiang4,*, Yuhui Xu1, Jiahui Chen1, Lina Tan1, Guo Liang5

    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 123-136, 2020, DOI:10.32604/cmc.2020.05933

    Abstract In mobile cloud computing, trust is a very important parameter in mobile cloud computing security because data storage and data processing are performed remotely in the cloud. Aiming at the security and trust management of mobile agent system in mobile cloud computing environment, the Human Trust Mechanism (HTM) is used to study the subjective trust formation, trust propagation and trust evolution law, and the subjective trust dynamic management algorithm (MASTM) is proposed. Based on the interaction experience between the mobile agent and the execution host and the third-party recommendation information to collect the basic trust data, the public trust host… More >

  • Open Access

    ARTICLE

    QoS-Aware and Resource-Efficient Dynamic Slicing Mechanism for Internet of Things

    Wenchen He1,*, Shaoyong Guo1, Yun Liang2, Rui Ma3, Xuesong Qiu1, Lei Shi4

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1345-1364, 2019, DOI:10.32604/cmc.2019.06669

    Abstract With the popularization of terminal devices and services in Internet of things (IoT), it will be a challenge to design a network resource allocation method meeting various QoS requirements and effectively using substrate resources. In this paper, a dynamic network slicing mechanism including virtual network (VN) mapping and VN reconfiguration is proposed to provide network slices for services. Firstly, a service priority model is defined to create queue for resource allocation. Then a slice including Virtual Network Function (VNF) placement and routing with optimal cost is generated by VN mapping. Next, considering temporal variations of service resource requirements, the size… More >

  • Open Access

    ARTICLE

    A Stochastic Numerical Analysis for Computer Virus Model with Vertical Transmission Over the Internet

    Muhammad Shoaib Arif1, Ali Raza1, Wasfi Shatanawi2, 3, *, Muhammad Rafiq4, Mairaj Bibi5

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1025-1043, 2019, DOI:10.32604/cmc.2019.08405

    Abstract We are presenting the numerical analysis for stochastic SLBR model of computer virus over the internet in this manuscript. We are going to present the results of stochastic and deterministic computer virus model. Outcomes of the threshold number C* hold in stochastic computer virus model. If C*<1 then in such a condition virus controlled in the computer population while C*>1 shows virus spread in the computer population. Unfortunately, stochastic numerical techniques fail to cope with large step sizes of time. The suggested structure of the stochastic non-standard finite difference scheme (SNSFD) maintains all diverse characteristics such as dynamical consistency, bounded-ness… More >

  • Open Access

    ARTICLE

    CPAC: Energy-Efficient Algorithm for IoT Sensor Networks Based on Enhanced Hybrid Intelligent Swarm

    Qi Wang1,*, Wei Liu1, Hualong Yu1, Shang Zheng1, Shang Gao1, Fabrizio Granelli2

    CMES-Computer Modeling in Engineering & Sciences, Vol.121, No.1, pp. 83-103, 2019, DOI:10.32604/cmes.2019.06897

    Abstract The wireless sensor network (WSN) is widely employed in the application scenarios of the Internet of Things (IoT) in recent years. Extending the lifetime of the entire system had become a significant challenge due to the energy-constrained fundamental limits of sensor nodes on the perceptual layer of IoT. The clustering routing structures are currently the most popular solution, which can effectively reduce the energy consumption of the entire network and improve its reliability. This paper introduces an enhanced hybrid intelligential algorithm based on particle swarm optimization (PSO) and ant colony optimization (ACO) method. The enhanced PSO is deployed to select… More >

  • Open Access

    ARTICLE

    A New Anti-Quantum Proxy Blind Signature for Blockchain-Enabled Internet of Things

    Chaoyang Li1,2,3, Gang Xu2, Yuling Chen1,*, Haseeb Ahmad4, Jian Li3

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 711-726, 2019, DOI:10.32604/cmc.2019.06279

    Abstract Blockchain technology has become a research hotspot in recent years with the prominent characteristics as public, distributed and decentration. And blockchain-enabled internet of things (BIoT) has a tendency to make a revolutionary change for the internet of things (IoT) which requires distributed trustless consensus. However, the scalability and security issues become particularly important with the dramatically increasing number of IoT devices. Especially, with the development of quantum computing, many extant cryptographic algorithms applied in blockchain or BIoT systems are vulnerable to the quantum attacks. In this paper, an anti-quantum proxy blind signature scheme based on the lattice cryptography has been… More >

  • Open Access

    ARTICLE

    IoT Based Approach in a Power System Network for Optimizing Distributed Generation Parameters

    P. Shanmugapriya1, J. Baskaran2, C. Nayanatara1,*, D. P. Kothari3

    CMES-Computer Modeling in Engineering & Sciences, Vol.119, No.3, pp. 541-558, 2019, DOI:10.32604/cmes.2019.04074

    Abstract The objective of this paper is to provide a robust Virtual Power Plant (VPP) network collaborated with Internet of Things (IoT) which uses a conceptual model to integrate each device in the grid. Based on the functionality all the devices which are purely distributed within the grid are networked initially from residential units to substations and up to service data and demand centres. To ensure the trapping of the available power and the efficient transfer of Distributed Generation (DG) power to the grid Distribution Active Control (DAC) strategy is used. Synchronized optimization of DG parameter which includes DG size, location… More >

  • Open Access

    ARTICLE

    A Survey on Cryptographic Security and Information Hiding Technology for Cloud or Fog-Based IoT System

    Liang Bai1, Yuzhen Liu1, Xiaoliang Wang1,*, Nick Patterson2, F. Jiang2

    Journal of Information Hiding and Privacy Protection, Vol.1, No.1, pp. 1-10, 2019, DOI:10.32604/jihpp.2019.06043

    Abstract Internet of Things (IoT) is an emerging paradigm involving intelligent sensor networks that incorporates embedded technology for collecting data, communicating with external environments. Recently, cloud computing together with fog computing has become an important research area of the Internet of Things because of big data processing capabilities. It is a promising technology that utilizes cloud or fog computing / architecture to improve sensor computing, storage, and communication capabilities. However, recently it has been shown that this computing/architecture may be vulnerable to various attacks because of the openness nature of the wireless network. Therefore, it becomes more and more important to… More >

  • Open Access

    ARTICLE

    Design of Intelligent Drunk Driving Detection System Based on Internet of Things

    Xiaorong Zhao1, Hongjin Zhu1, Xiufang Qian1,*, Chunpeng Ge2

    Journal on Internet of Things, Vol.1, No.2, pp. 55-62, 2019, DOI:10.32604/jiot.2019.06315

    Abstract In recent years, with the rapid development of China’s economy and the continuous improvement of people’s living standards, the number of motor vehicles and the number of drivers in the country have grown rapidly. Due to the increase in the number of vehicles and the number of motorists, the traffic accident rate is increasing, causing serious economic losses to society. According to the traffic accident statistics of the Ministry of Communications of China in 2009, more than 300,000 car accidents occurred in the year, most of which were caused by drunk driving. Therefore, this paper proposes a design scheme based… More >

  • Open Access

    ARTICLE

    Analyzing the Structure and Connectivity of Continent-Level Internet Topology

    Xionglve Li1, Junhua Xi1, Zhiping Cai1,*, Tao Yang1, Chak Fong Cheang2

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 955-964, 2019, DOI:10.32604/cmc.2019.05769

    Abstract The research and analysis of Internet topology is hot in the field of network measurement, which have important applications in network security, traffic scheduling and many other fields. Most of the existing works are focused on the AS-level and router-level topology, but few works are about the IP-level topology. In fact, obtaining the topology of each continent and knowing how the topologies of the continents are connected to each other can help us understanding the Internet around the world more thoroughly. In this paper, we obtained data sets from RIPE, constructed and analyzed network topologies of all the continents. By… More >

Displaying 511-520 on page 52 of 530. Per Page