Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (407)
  • Open Access


    A Distributed Approach of Big Data Mining for Financial Fraud Detection in a Supply Chain

    Hangjun Zhou1, *, Guang Sun1, 2, Sha Fu1, Xiaoping Fan1, Wangdong Jiang1, Shuting Hu1, Lingjiao Li1

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1091-1105, 2020, DOI:10.32604/cmc.2020.09834

    Abstract Supply Chain Finance (SCF) is important for improving the effectiveness of supply chain capital operations and reducing the overall management cost of a supply chain. In recent years, with the deep integration of supply chain and Internet, Big Data, Artificial Intelligence, Internet of Things, Blockchain, etc., the efficiency of supply chain financial services can be greatly promoted through building more customized risk pricing models and conducting more rigorous investment decision-making processes. However, with the rapid development of new technologies, the SCF data has been massively increased and new financial fraud behaviors or patterns are becoming more covertly scattered among normal… More >

  • Open Access


    Anomaly IoT Node Detection Based on Local Outlier Factor and Time Series

    Fang Wang1, *, Zhe Wei1, Xu Zuo2

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1063-1073, 2020, DOI:10.32604/cmc.2020.09774

    Abstract The heterogeneous nodes in the Internet of Things (IoT) are relatively weak in the computing power and storage capacity. Therefore, traditional algorithms of network security are not suitable for the IoT. Once these nodes alternate between normal behavior and anomaly behavior, it is difficult to identify and isolate them by the network system in a short time, thus the data transmission accuracy and the integrity of the network function will be affected negatively. Based on the characteristics of IoT, a lightweight local outlier factor detection method is used for node detection. In order to further determine whether the nodes are… More >

  • Open Access


    Energy Efficiency in Internet of Things: An Overview

    Wuxiong Zhang1, 2, Weidong Fang1, 2, *, Qianqian Zhao1, 2, Xiaohong Ji3, Guoqing Jia3

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 787-811, 2020, DOI:10.32604/cmc.2020.07620

    Abstract Energy efficiency is very important for the Internet of Things (IoT), especially for front-end sensed terminal or node. It not only embodies the node’s life, but also reflects the lifetime of the network. Meanwhile, it is also a key indicator of green communications. Unfortunately, there is no article on systematic analysis and review for energy efficiency evaluation in IoT. In this paper, we systemically analyze the architecture of IoT, and point out its energy distribution, Furthermore, we summarized the energy consumption model in IoT, analyzed the pros and cons of improving energy efficiency, presented a state of the art the… More >

  • Open Access


    QoS-Aware and Resource-Efficient Dynamic Slicing Mechanism for Internet of Things

    Wenchen He1,*, Shaoyong Guo1, Yun Liang2, Rui Ma3, Xuesong Qiu1, Lei Shi4

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1345-1364, 2019, DOI:10.32604/cmc.2019.06669

    Abstract With the popularization of terminal devices and services in Internet of things (IoT), it will be a challenge to design a network resource allocation method meeting various QoS requirements and effectively using substrate resources. In this paper, a dynamic network slicing mechanism including virtual network (VN) mapping and VN reconfiguration is proposed to provide network slices for services. Firstly, a service priority model is defined to create queue for resource allocation. Then a slice including Virtual Network Function (VNF) placement and routing with optimal cost is generated by VN mapping. Next, considering temporal variations of service resource requirements, the size… More >

  • Open Access


    CPAC: Energy-Efficient Algorithm for IoT Sensor Networks Based on Enhanced Hybrid Intelligent Swarm

    Qi Wang1,*, Wei Liu1, Hualong Yu1, Shang Zheng1, Shang Gao1, Fabrizio Granelli2

    CMES-Computer Modeling in Engineering & Sciences, Vol.121, No.1, pp. 83-103, 2019, DOI:10.32604/cmes.2019.06897

    Abstract The wireless sensor network (WSN) is widely employed in the application scenarios of the Internet of Things (IoT) in recent years. Extending the lifetime of the entire system had become a significant challenge due to the energy-constrained fundamental limits of sensor nodes on the perceptual layer of IoT. The clustering routing structures are currently the most popular solution, which can effectively reduce the energy consumption of the entire network and improve its reliability. This paper introduces an enhanced hybrid intelligential algorithm based on particle swarm optimization (PSO) and ant colony optimization (ACO) method. The enhanced PSO is deployed to select… More >

  • Open Access


    A New Anti-Quantum Proxy Blind Signature for Blockchain-Enabled Internet of Things

    Chaoyang Li1,2,3, Gang Xu2, Yuling Chen1,*, Haseeb Ahmad4, Jian Li3

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 711-726, 2019, DOI:10.32604/cmc.2019.06279

    Abstract Blockchain technology has become a research hotspot in recent years with the prominent characteristics as public, distributed and decentration. And blockchain-enabled internet of things (BIoT) has a tendency to make a revolutionary change for the internet of things (IoT) which requires distributed trustless consensus. However, the scalability and security issues become particularly important with the dramatically increasing number of IoT devices. Especially, with the development of quantum computing, many extant cryptographic algorithms applied in blockchain or BIoT systems are vulnerable to the quantum attacks. In this paper, an anti-quantum proxy blind signature scheme based on the lattice cryptography has been… More >

  • Open Access


    IoT Based Approach in a Power System Network for Optimizing Distributed Generation Parameters

    P. Shanmugapriya1, J. Baskaran2, C. Nayanatara1,*, D. P. Kothari3

    CMES-Computer Modeling in Engineering & Sciences, Vol.119, No.3, pp. 541-558, 2019, DOI:10.32604/cmes.2019.04074

    Abstract The objective of this paper is to provide a robust Virtual Power Plant (VPP) network collaborated with Internet of Things (IoT) which uses a conceptual model to integrate each device in the grid. Based on the functionality all the devices which are purely distributed within the grid are networked initially from residential units to substations and up to service data and demand centres. To ensure the trapping of the available power and the efficient transfer of Distributed Generation (DG) power to the grid Distribution Active Control (DAC) strategy is used. Synchronized optimization of DG parameter which includes DG size, location… More >

  • Open Access


    A Survey on Cryptographic Security and Information Hiding Technology for Cloud or Fog-Based IoT System

    Liang Bai1, Yuzhen Liu1, Xiaoliang Wang1,*, Nick Patterson2, F. Jiang2

    Journal of Information Hiding and Privacy Protection, Vol.1, No.1, pp. 1-10, 2019, DOI:10.32604/jihpp.2019.06043

    Abstract Internet of Things (IoT) is an emerging paradigm involving intelligent sensor networks that incorporates embedded technology for collecting data, communicating with external environments. Recently, cloud computing together with fog computing has become an important research area of the Internet of Things because of big data processing capabilities. It is a promising technology that utilizes cloud or fog computing / architecture to improve sensor computing, storage, and communication capabilities. However, recently it has been shown that this computing/architecture may be vulnerable to various attacks because of the openness nature of the wireless network. Therefore, it becomes more and more important to… More >

  • Open Access


    Design of Intelligent Drunk Driving Detection System Based on Internet of Things

    Xiaorong Zhao1, Hongjin Zhu1, Xiufang Qian1,*, Chunpeng Ge2

    Journal on Internet of Things, Vol.1, No.2, pp. 55-62, 2019, DOI:10.32604/jiot.2019.06315

    Abstract In recent years, with the rapid development of China’s economy and the continuous improvement of people’s living standards, the number of motor vehicles and the number of drivers in the country have grown rapidly. Due to the increase in the number of vehicles and the number of motorists, the traffic accident rate is increasing, causing serious economic losses to society. According to the traffic accident statistics of the Ministry of Communications of China in 2009, more than 300,000 car accidents occurred in the year, most of which were caused by drunk driving. Therefore, this paper proposes a design scheme based… More >

  • Open Access


    Developing a New Security Framework for Bluetooth Low Energy Devices

    Qiaoyang Zhang1, Zhiyao Liang1,*, Zhiping Cai2

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 457-471, 2019, DOI:10.32604/cmc.2019.03758

    Abstract Wearable devices are becoming more popular in our daily life. They are usually used to monitor health status, track fitness data, or even do medical tests, etc. Since the wearable devices can obtain a lot of personal data, their security issues are very important. Motivated by the consideration that the current pairing mechanisms of Bluetooth Low Energy (BLE) are commonly impractical or insecure for many BLE based wearable devices nowadays, we design and implement a security framework in order to protect the communication between these devices. The security framework is a supplement to the Bluetooth pairing mechanisms and is compatible… More >

Displaying 391-400 on page 40 of 407. Per Page