Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (650)
  • Open Access

    ARTICLE

    A Dual-Chaining Watermark Scheme for Data Integrity Protection in Internet of Things

    Baowei Wang1,2,*, Weiwen Kong1, Wei Li1, Neal N. Xiong3

    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 679-695, 2019, DOI:10.32604/cmc.2019.06106

    Abstract Chaining watermark is an effective way to verify the integrity of streaming data in wireless network environment, especially in resource-constrained sensor networks, such as the perception layer of Internet of Things applications. However, in all existing single chaining watermark schemes, how to ensure the synchronization between the data sender and the receiver is still an unsolved problem. Once the synchronization points are attacked by the adversary, existing data integrity authentication schemes are difficult to work properly, and the false negative rate might be up to 50 percent. And the additional fixed group delimiters not only… More >

  • Open Access

    ARTICLE

    An Asynchronous Clustering and Mobile Data Gathering Schema Based on Timer Mechanism in Wireless Sensor Networks

    Jin Wang1,2,3, Yu Gao3, Wei Liu3, Wenbing Wu1, Se-Jung Lim4,*

    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 711-725, 2019, DOI:10.32604/cmc.2019.05450

    Abstract Recently, Wireless sensor networks (WSNs) have become very popular research topics which are applied to many applications. They provide pervasive computing services and techniques in various potential applications for the Internet of Things (IoT). An Asynchronous Clustering and Mobile Data Gathering based on Timer Mechanism (ACMDGTM) algorithm is proposed which would mitigate the problem of “hot spots” among sensors to enhance the lifetime of networks. The clustering process takes sensors’ location and residual energy into consideration to elect suitable cluster heads. Furthermore, one mobile sink node is employed to access cluster heads in accordance with More >

  • Open Access

    ARTICLE

    Preface of Special Issue: Future Internet

    Xiulong Liu1, Mianxiong Dong2, Xiaobo Zhou3

    Computer Systems Science and Engineering, Vol.33, No.4, pp. 233-234, 2018, DOI:10.32604/csse.2018.33.233

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    Middleware for Internet of Things: Survey and Challenges

    Samia Allaoua Chellouga, Mohamed A. El-Zawawyb,c

    Intelligent Automation & Soft Computing, Vol.24, No.2, pp. 309-318, 2018, DOI:10.1080/10798587.2017.1290328

    Abstract The Internet of things (IoT) applications span many potential fields. Furthermore, smart homes, smart cities, smart vehicular networks, and healthcare are very attractive and intelligent applications. In most of these applications, the system consists of smart objects that are equipped by sensors and Radio Frequency Identification (RFID) and may rely on other technological computing and paradigm solutions such as M2 M (machine to machine) computing, Wifi, Wimax, LTE, cloud computing, etc. Thus, the IoT vision foresees that we can shift from traditional sensor networks to pervasive systems, which deliver intelligent automation by running services on objects.… More >

  • Open Access

    ARTICLE

    A Hot Event Influence Scope Assessment Method in Cyber-Physical Space For Big Data Application

    Yunlan Xuea, Lingyu Xub, Jie Yub, Gaowei Zhangb

    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 97-106, 2018, DOI:10.1080/10798587.2016.1267247

    Abstract The increase of scale and complexity of Internet big data presents unprecedented opportunities on Cyber-Physical Systems (CPS). The incompleteness and incredibility of Internet big data are challenging issues for confirming the event influence scope. To solve the above problem, we propose CyberPhysical Space Event Model (CPSEM) to analyze event influence in multi-viewer, which maps real data into Cyber Space (CS) and Physical Space (PS). In addition, we propose Event Influence Scope Detection Algorithm (EISDA) to detect the scope of a hot event in Cyber Space and Physical Space. More >

  • Open Access

    ARTICLE

    A Fuzzy Approach for an IoT-based Automated Employee Performance Appraisal

    Jaideep Kaur1, Kamaljit Kaur2

    CMC-Computers, Materials & Continua, Vol.53, No.1, pp. 23-36, 2017, DOI:10.3970/cmc.2017.053.024

    Abstract The ubiquitous Internet of Things (IoT) through RFIDs, GPS, NFC and other wireless devices is capable of sensing the activities being carried around Industrial environment so as to automate industrial processes. In almost every industry, employee performance appraisal is done manually which may lead to favoritisms. This paper proposes a framework to perform automatic employee performance appraisal based on data sensed from IoT. The framework classifies raw IoT data into three activities (Positive, Negative, Neutral), co-locates employee and activity in order to calculate employee implication and then performs cognitive decision making using fuzzy logic. From More >

  • Open Access

    ARTICLE

    Internet program for facilitating dietary modifications limiting kidney stone risk

    Jessica N. Lange1, Linda Easter1, Robert Amoroso1, Debra Benfield1, Patrick W. Mufarrij2, John Knight3, Ross P. Holmes3, Dean G. Assimos3

    Canadian Journal of Urology, Vol.20, No.5, pp. 6922-6926, 2013

    Abstract Introduction: Certain dietary modifications limit the risk of stone recurrence. Compliance is an important component of dietary therapy for stone prevention, and self-efficacy is an important ingredient of compliance. We developed an internet program to facilitate dietary compliance for stone prevention and performed a pilot study to assess its effectiveness.
    Materials and methods: The internet program provides information regarding dietary modifications including increased fluid consumption, limited animal protein, sodium, and oxalate intake, and adequate calcium consumption. Participants record their daily food and fluid intake and receive immediate feedback as to whether they were compliant or not. Five… More >

  • Open Access

    ARTICLE

    Proton therapy for prostate cancer online: patient education or marketing?

    Daniel J. Sadowski1, Chandy S. Ellimoottil2, Ajay Tejwani3, Alex Gorbonos1

    Canadian Journal of Urology, Vol.20, No.6, pp. 7015-7020, 2013

    Abstract Introduction: Proton therapy (PT) for prostate cancer is an expensive treatment with limited evidence of benefit over conventional radiotherapy. We sought to study whether online information on PT for prostate cancer was balanced and whether the website source influenced the content presented.
    Materials and methods: We applied a systematic search process to identify 270 weblinks associated with PT for prostate cancer, categorized the websites by source, and filtered the results to 50 websites using predetermined criteria. We then used a customized version of the DISCERN instrument, a validated tool for assessing the quality of consumer health information,… More >

  • Open Access

    EDITORIAL

    Doctor Google and the Internet Prescription

    Leonard G. Gomella

    Canadian Journal of Urology, Vol.17, No.1, pp. 4971-4971, 2010

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    Web-based electronic health information systems for prostate cancer patients

    Howard H. Pai1,2, Francis Lau2

    Canadian Journal of Urology, Vol.12, No.3, pp. 2700-2709, 2005

    Abstract Introduction: Providing men with prostate cancer (MPC) timely access to their health records and information (HRI) can enhance their ability to understand their condition and engage in shared medical decision making with their health care provider (HCP). The Internet is a potential means of enhancing such interactions.
    Materials and methods: Two surveys were conducted at a PC support group in Victoria, BC to identify the health information needs of MPC and the ability to access their HRI. Another objective was to identify the potential role of web-enabled HRI systems at meeting these needs. Sixty-one participants (41 men… More >

Displaying 641-650 on page 65 of 650. Per Page