Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (703)
  • Open Access

    ARTICLE

    Internet of Things Enabled Intelligent Energy Management and Control System for Heavy Equipment Industrial Park and Fuzzy Assessment of Its Schemes

    Jia Zhu*

    Energy Engineering, Vol.118, No.2, pp. 379-397, 2021, DOI:10.32604/EE.2021.014178 - 23 December 2020

    Abstract In order to solve the problems of poor information flow, low energy utilization rate and energy consumption data reuse in the heavy equipment industrial park, the Internet of Things (IoT) technology is applied to construct the intelligent energy management and control system (IEMCS). The application architecture and function module planning are analyzed and designed. Furthermore, the IEMCS scheme is not unique due to the fuzziness of customer demand and the understanding deviation of designer to customer demand in the design stage. Scheme assessment is of great significance for the normal subsequent implementation of the system.… More >

  • Open Access

    ARTICLE

    Data Security Storage Model of the Internet of Things Based on Blockchain

    Pingshui Wang1,2,*, Willy Susilo2

    Computer Systems Science and Engineering, Vol.36, No.1, pp. 213-224, 2021, DOI:10.32604/csse.2021.014541 - 23 December 2020

    Abstract With the development of information technology, the Internet of Things (IoT) has gradually become the third wave of the worldwide information industry revolution after the computer and the Internet. The application of the IoT has brought great convenience to people’s production and life. However, the potential information security problems in various IoT applications are gradually exposed and people pay more attention to them. The traditional centralized data storage and management model of the IoT is easy to cause transmission delay, single point of failure, privacy disclosure and other problems, and eventually leads to unpredictable behavior More >

  • Open Access

    ARTICLE

    A Model Transformation Approach for Detecting Distancing Violations in Weighted Graphs

    Ahmad F. Subahi*

    Computer Systems Science and Engineering, Vol.36, No.1, pp. 13-39, 2021, DOI:10.32604/csse.2021.014376 - 23 December 2020

    Abstract This work presents the design of an Internet of Things (IoT) edge-based system based on model transformation and complete weighted graph to detect violations of social distancing measures in indoor public places. A wireless sensor network based on Bluetooth Low Energy is introduced as the infrastructure of the proposed design. A hybrid model transformation strategy for generating a graph database to represent groups of people is presented as a core middleware layer of the detecting system’s proposed architectural design. A Neo4j graph database is used as a target implementation generated from the proposed transformational system… More >

  • Open Access

    ARTICLE

    Monitoring of Unaccounted for Gas in Energy Domain Using Semantic Web Technologies

    Kausar Parveen1,*, Ghalib A. Shah2, Muhammad Aslam3, Amjad Farooq3

    Computer Systems Science and Engineering, Vol.36, No.1, pp. 41-56, 2021, DOI:10.32604/csse.2021.013787 - 23 December 2020

    Abstract Smart Urbanization has increased tremendously over the last few years, and this has exacerbated problems in all areas of life, especially in the energy sector. The Internet of Things (IoT) is providing effective solutions in gas distribution, transmission and billing through very sophisticated sensory devices and software. Billions of heterogeneous devices link to each other in smart urbanization, and this has led to the Semantic interoperability (SI) problem between the connected devices. In the energy field, such as electricity and gas, several devices are interlinked. These devices are competent for their specific operational role but… More >

  • Open Access

    ARTICLE

    IoT Technologies for Tackling COVID-19 in Malaysia and Worldwide: Challenges, Recommendations, and Proposed Framework

    Ali Saadon Al-Ogaili1,*, Ameer Alhasan2, Agileswari Ramasamy1, Marayati Binti Marsadek1, Tengku Juhana Tengku Hashim1, Ammar Al-Sharaa3, Mastura Binti Aadam3, Lukman Audah2

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 2141-2164, 2021, DOI:10.32604/cmc.2020.013440 - 26 November 2020

    Abstract The Coronavirus (COVID-19) pandemic is considered as a global public health challenge. To contain this pandemic, different measures are being taken globally. The Internet of Things (IoT) has been represented as one of the most important schemes that has been considered to fight the spread of COVID-19 in the world, practically Malaysia. In fact, there are many sectors in Malaysia would be transformed into smart services by using IoT technologies, particularly energy, transportation, healthcare sectors. This manuscript presents a comprehensive review of the IoT technologies that are being used currently in Malaysia to accelerate the… More >

  • Open Access

    ARTICLE

    Memetic Optimization with Cryptographic Encryption for Secure Medical Data Transmission in IoT-Based Distributed Systems

    Srinath Doss1, Jothi Paranthaman2, Suseendran Gopalakrishnan3, Akila Duraisamy3, Souvik Pal4, Balaganesh Duraisamy5, Chung Le Van6,*, Dac-Nhuong Le7

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1577-1594, 2021, DOI:10.32604/cmc.2020.012379 - 26 November 2020

    Abstract In the healthcare system, the Internet of Things (IoT) based distributed systems play a vital role in transferring the medical-related documents and information among the organizations to reduce the replication in medical tests. This datum is sensitive, and hence security is a must in transforming the sensational contents. In this paper, an Evolutionary Algorithm, namely the Memetic Algorithm is used for encrypting the text messages. The encrypted information is then inserted into the medical images using Discrete Wavelet Transform 1 level and 2 levels. The reverse method of the Memetic Algorithm is implemented when extracting More >

  • Open Access

    ARTICLE

    Green Energy Development System under the Background of Environmental Sustainability

    Qin Liu*, Ruliang Zhang

    Energy Engineering, Vol.118, No.1, pp. 173-187, 2021, DOI:10.32604/EE.2020.012788 - 17 November 2020

    Abstract With the continuous advancement of economic globalization, energy demand is expanding and energy consumption is excessive, which leads to energy shortage. Unreasonable energy use also brings great challenges to the environment and affects the balance of the ecosystem seriously. The rise of the third industrial revolution has injected new vitality into energy system. The construction of energy Internet system, which integrates Internet technology and energy technology, has become a new energy system of sustainable development. It has put forward the reform scheme for the mismatch of energy demand points and environmental pollution. The deepening of… More >

  • Open Access

    ARTICLE

    Emergency Prioritized and Congestion Handling Protocol for Medical Internet of Things

    Sabeen Tahir*, Sheikh Tahir Bakhsh, Rayed AlGhamdi

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 733-749, 2021, DOI:10.32604/cmc.2020.013261 - 30 October 2020

    Abstract Medical Internet of Things (MIoTs) is a collection of small and energyefficient wireless sensor devices that monitor the patient’s body. The healthcare networks transmit continuous data monitoring for the patients to survive them independently. There are many improvements in MIoTs, but still, there are critical issues that might affect the Quality of Service (QoS) of a network. Congestion handling is one of the critical factors that directly affect the QoS of the network. The congestion in MIoT can cause more energy consumption, delay, and important data loss. If a patient has an emergency, then the… More >

  • Open Access

    ARTICLE

    Intelligent Tunicate Swarm-Optimization-Algorithm-Based Lightweight Security Mechanism in Internet of Health Things

    Gia Nhu Nguyen1,2, Nin Ho Le Viet1,2, Gyanendra Prasad Joshi3, Bhanu Shrestha4,*

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 551-562, 2021, DOI:10.32604/cmc.2020.012441 - 30 October 2020

    Abstract Fog computing in the Internet of Health Things (IoHT) is promising owing to the increasing need for energy- and latency-optimized health sector provisioning. Additionally, clinical data (particularly, medical image data) are a delicate, highly protected resource that should be utilized in an effective and responsible manner to fulfil consumer needs. Herein, we propose an energy-effi- cient fog-based IoHT with a tunicate swarm-optimization-(TSO)-based lightweight Simon cipher to enhance the energy efficiency at the fog layer and the security of data stored at the cloud server. The proposed Simon cipher uses the TSO algorithm to select the More >

  • Open Access

    ARTICLE

    Traffic Queuing Management in the Internet of Things: An Optimized RED Algorithm Based Approach

    Abdul Waheed1,2,*, Naila Habib Khan3, Mahdi Zareei4, Shahab Ul Islam5, Latif Jan5,6, Arif Iqbal Umar1, Ehab Mahmoud Mohamed7,8

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 359-372, 2021, DOI:10.32604/cmc.2020.012196 - 30 October 2020

    Abstract Congestion control is one of the main obstacles in cyberspace traffic. Overcrowding in internet traffic may cause several problems; such as high packet hold-up, high packet dropping, and low packet output. In the course of data transmission for various applications in the Internet of things, such problems are usually generated relative to the input. To tackle such problems, this paper presents an analytical model using an optimized Random Early Detection (RED) algorithm-based approach for internet traffic management. The validity of the proposed model is checked through extensive simulation-based experiments. An analysis is observed for different More >

Displaying 641-650 on page 65 of 703. Per Page