Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (703)
  • Open Access

    ARTICLE

    Task-Attribute-Based Access Control Scheme for IoT via Blockchain

    Hao Chen1, Wunan Wan1, *, Jinyue Xia2, *, Shibin Zhang1, Jinquan Zhang1, Xizi Peng1, Xingjie Fan1

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2441-2453, 2020, DOI:10.32604/cmc.2020.011824 - 16 September 2020

    Abstract As a new form of network, the Internet of things (IoT) is becoming more widely used in people’s lives. In this paper, related theoretical research and practical applications of the IoT are explored. The security of the IoT has become a hot research topic. Access controls are methods that control reasonable allocations of data and resources and ensure the security of the IoT. However, most access control systems do not dynamically assign users’ rights. Additionally, with some access control systems, there is a risk of overstepping other user’s authority, and there may exist a central… More >

  • Open Access

    ARTICLE

    Study on Multi-Label Classification of Medical Dispute Documents

    Baili Zhang1, 2, 3, *, Shan Zhou1, Le Yang1, Jianhua Lv1, 2, Mingjun Zhong4

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 1975-1986, 2020, DOI:10.32604/cmc.2020.010914 - 16 September 2020

    Abstract The Internet of Medical Things (IoMT) will come to be of great importance in the mediation of medical disputes, as it is emerging as the core of intelligent medical treatment. First, IoMT can track the entire medical treatment process in order to provide detailed trace data in medical dispute resolution. Second, IoMT can infiltrate the ongoing treatment and provide timely intelligent decision support to medical staff. This information includes recommendation of similar historical cases, guidance for medical treatment, alerting of hired dispute profiteers etc. The multi-label classification of medical dispute documents (MDDs) plays an important… More >

  • Open Access

    ARTICLE

    The Impact of Privacy Seal on Users’ Perception in Network Transactions

    Jing Chen,Yuchen Luo2,†, Ruiqi Du3,‡

    Computer Systems Science and Engineering, Vol.35, No.3, pp. 199-206, 2020, DOI:10.32604/csse.2020.35.199

    Abstract In the age of big data, the issue of online privacy has attracted much attention from all sectors. The introduction and establishment of an evaluation system for the privacy agreement based on a third party, together with the establishment of a safer internet transaction environment, can help to establish mutual trust between users and the platform. With the research background links to the online trading platform, this article investigates how the privacy seal which is provided by the third-party evaluation organization influences and addresses trust-awareness and privacy concerns of users, as well as exposing information… More >

  • Open Access

    ARTICLE

    Multi Level Key Exchange and Encryption Protocol for Internet of Things (IoT)

    Poomagal C T1,∗, Sathish kumar G A2, Deval Mehta3

    Computer Systems Science and Engineering, Vol.35, No.1, pp. 51-63, 2020, DOI:10.32604/csse.2020.35.051

    Abstract The burgeoning network communications for multiple applications such as commercial, IoT, consumer devices, space, military, and telecommunications are facing many security and privacy challenges. Over the past decade, the Internet of Things (IoT) has been a focus of study. Security and privacy are the most important problems for IoT applications and are still facing huge difficulties. To promote this high-security IoT domain and prevent security attacks from unauthorized users, keys are frequently exchanged through a public key exchange algorithm. This paper introduces a novel algorithm based on Elliptic Curve Cryptography(ECC) for multi-level Public Key Exchange More >

  • Open Access

    ARTICLE

    An Internet of Things Platform for Air Station Remote Sensing and Smart Monitoring

    David Corral-Plaza1, Juan Boubeta-Puig1, Guadalupe Ortiz1, Alfonso Garcia-de-Prado2,*

    Computer Systems Science and Engineering, Vol.35, No.1, pp. 5-12, 2020, DOI:10.32604/csse.2020.35.005

    Abstract Air pollution is currently receiving more attention by international governments and organizations. Nevertheless, current systems for air quality monitoring lack essential requirements which are key in order to be effective concerning users’ access to the information and efficient regarding real-time monitoring and notification. This paper presents an Internet of Things platform for air station remote sensing and smart monitoring that combines Big Data and Cloud Computing paradigms to process and correlate air pollutant concentrations coming from multiple remote stations, as well as to trigger automatic and personalized alerts when a health risk for their particular More >

  • Open Access

    ARTICLE

    Research on Data Extraction and Analysis of Software Defect in IoT Communication Software

    Wenbin Bi1, Fang Yu2, Ning Cao3, Wei Huo3, Guangsheng Cao4, *, Xiuli Han5, Lili Sun6, Russell Higgs7

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1837-1854, 2020, DOI:10.32604/cmc.2020.010420 - 20 August 2020

    Abstract Software defect feature selection has problems of feature space dimensionality reduction and large search space. This research proposes a defect prediction feature selection framework based on improved shuffled frog leaping algorithm (ISFLA).Using the two-level structure of the framework and the improved hybrid leapfrog algorithm's own advantages, the feature values are sorted, and some features with high correlation are selected to avoid other heuristic algorithms in the defect prediction that are easy to produce local The case where the convergence rate of the optimal or parameter optimization process is relatively slow. The framework improves generalization of… More >

  • Open Access

    ARTICLE

    Mitigating and Monitoring Smart City Using Internet of Things

    Sudan Jha1, Lewis Nkenyereye2, *, Gyanendra Prasad Joshi3, Eunmok Yang4

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1059-1079, 2020, DOI:10.32604/cmc.2020.011754 - 20 August 2020

    Abstract The present trends in smart world reflects the extensive use of limited resources through information and communication technology. The limited resources like space, mobility, energy, etc., have been consumed rigorously towards creating optimized but smart instances. Thus, a new concept of IoT integrated smart city vision is yet to be proposed which includes a combination of systems like noise and air loss monitoring, web monitoring and fire detection systems, smart waste bin systems, etc., that have not been clearly addressed in the previous researches. This paper focuses on developing an effective system for possible monitoring More >

  • Open Access

    ARTICLE

    Emotion-Based Painting Image Display System

    Taemin Lee1, Dongwann Kang2, Kyunghyun Yoon1, Sanghyun Seo3,*

    Intelligent Automation & Soft Computing, Vol.26, No.1, pp. 181-192, 2020, DOI:10.31209/2019.100000139

    Abstract As mobile devices have tremendously developed, people can now get sensor data easily. These data are not only physical data such as temperature, humidity, gravity, acceleration, etc. but also human health data such as blood pressure, heart pulse rate, etc. With this information, Internet of Things (IoT) technology has provided many systems to support human health care. Systems for human health care support physical health care like checking blood pressure, pulse rate, etc. However, the demand for physical health care as well as mental health care is increasing. So, a system, which automatically recommends a… More >

  • Open Access

    ARTICLE

    Deep Learning-Based Intrusion System for Vehicular Ad Hoc Networks

    Fei Li1, *, Jiayan Zhang1, Edward Szczerbicki2, Jiaqi Song1, Ruxiang Li 1, Renhong Diao1

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 653-681, 2020, DOI:10.32604/cmc.2020.011264 - 23 July 2020

    Abstract The increasing use of the Internet with vehicles has made travel more convenient. However, hackers can attack intelligent vehicles through various technical loopholes, resulting in a range of security issues. Due to these security issues, the safety protection technology of the in-vehicle system has become a focus of research. Using the advanced autoencoder network and recurrent neural network in deep learning, we investigated the intrusion detection system based on the in-vehicle system. We combined two algorithms to realize the efficient learning of the vehicle’s boundary behavior and the detection of intrusive behavior. In order to More >

  • Open Access

    ARTICLE

    Behavioral Feature and Correlative Detection of Multiple Types of Node in the Internet of Vehicles

    Pengshou Xie1, Guoqiang Ma1, *, Tao Feng1, Yan Yan1, 2, Xueming Han1

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1127-1137, 2020, DOI:10.32604/cmc.2020.09695 - 10 June 2020

    Abstract Undoubtedly, uncooperative or malicious nodes threaten the safety of Internet of Vehicles (IoV) by destroying routing or data. To this end, some researchers have designed some node detection mechanisms and trust calculating algorithms based on some different feature parameters of IoV such as communication, data, energy, etc., to detect and evaluate vehicle nodes. However, it is difficult to effectively assess the trust level of a vehicle node only by message forwarding, data consistency, and energy sufficiency. In order to resolve these problems, a novel mechanism and a new trust calculating model is proposed in this… More >

Displaying 661-670 on page 67 of 703. Per Page