Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (57)
  • Open Access

    ARTICLE

    Routing with Cooperative Nodes Using Improved Learning Approaches

    R. Raja1,*, N. Satheesh2, J. Britto Dennis3, C. Raghavendra4

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 2857-2874, 2023, DOI:10.32604/iasc.2023.026153

    Abstract In IoT, routing among the cooperative nodes plays an incredible role in fulfilling the network requirements and enhancing system performance. The evaluation of optimal routing and related routing parameters over the deployed network environment is challenging. This research concentrates on modelling a memory-based routing model with Stacked Long Short Term Memory (s − LSTM) and Bi-directional Long Short Term Memory (b − LSTM). It is used to hold the routing information and random routing to attain superior performance. The proposed model is trained based on the searching and detection mechanisms to compute the packet delivery ratio (PDR), end-to-end (E2E) delay, throughput,… More >

  • Open Access

    ARTICLE

    A Multi-Stage Secure IoT Authentication Protocol

    Khalid Alhusayni1, Raniyah Wazirali1, Mousa AlAkhras1,2, Marwah Almasri1,*, Samah Alhazmi1

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 459-481, 2023, DOI:10.32604/csse.2023.028536

    Abstract The Internet of Things (IoT) is a network of heterogeneous and smart devices that can make decisions without human intervention. It can connect millions of devices across the universe. Their ability to collect information, perform analysis, and even come to meaningful conclusions without human capital intervention matters. Such circumstances require stringent security measures and, in particular, the extent of authentication. Systems applied in the IoT paradigm point out high-interest levels since enormous damage will occur if a malicious, wrongly authenticated device finds its way into the IoT system. This research provides a clear and updated… More >

  • Open Access

    ARTICLE

    A Dynamic Management Scheme for Internet of Things (IoT) Environments: Simulation and Performance Evaluation

    Omar Said*

    CMES-Computer Modeling in Engineering & Sciences, Vol.133, No.3, pp. 673-695, 2022, DOI:10.32604/cmes.2022.021160

    Abstract In recent years, the Internet of Things (IoT) technology has been considered one of the most attractive fields for researchers due to its aspirations and implications for society and life as a whole. The IoT environment contains vast numbers of devices, equipment, and heterogeneous users who generate massive amounts of data. Furthermore, things’ entry into and exit from IoT systems occur dynamically, changing the topology and content of IoT networks very quickly. Therefore, managing IoT environments is among the most pressing challenges. This paper proposes an adaptive and dynamic scheme for managing IoT environments is… More >

  • Open Access

    ARTICLE

    Mutated Leader Sine-Cosine Algorithm for Secure Smart IoT-Blockchain of Industry 4.0

    Mustufa Haider Abidi*, Hisham Alkhalefah, Muneer Khan Mohammed

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5367-5383, 2022, DOI:10.32604/cmc.2022.030018

    Abstract In modern scenarios, Industry 4.0 entails invention with various advanced technology, and blockchain is one among them. Blockchains are incorporated to enhance privacy, data transparency as well as security for both large and small scale enterprises. Industry 4.0 is considered as a new synthesis fabrication technique that permits the manufacturers to attain their target effectively. However, because numerous devices and machines are involved, data security and privacy are always concerns. To achieve intelligence in Industry 4.0, blockchain technologies can overcome potential cybersecurity constraints. Nowadays, the blockchain and internet of things (IoT) are gaining more attention… More >

  • Open Access

    ARTICLE

    A Deep Trash Classification Model on Raspberry Pi 4

    Thien Khai Tran1, Kha Tu Huynh2,*, Dac-Nhuong Le3, Muhammad Arif4, Hoa Minh Dinh1

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2479-2491, 2023, DOI:10.32604/iasc.2023.029078

    Abstract Environmental pollution has had substantial impacts on human life, and trash is one of the main sources of such pollution in most countries. Trash classification from a collection of trash images can limit the overloading of garbage disposal systems and efficiently promote recycling activities; thus, development of such a classification system is topical and urgent. This paper proposed an effective trash classification system that relies on a classification module embedded in a hard-ware setup to classify trash in real time. An image dataset is first augmented to enhance the images before classifying them as either… More >

  • Open Access

    ARTICLE

    Super Compact UWB Monopole Antenna for Small IoT Devices

    Ahmed Jamal Abdullah Al-Gburi1, Zahriladha Zakaria1,*, Merih Palandoken2, Imran Mohd Ibrahim1, A. A. Althuwayb3, Sarosh Ahmad4, Samir Salem Al-Bawri5

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2785-2799, 2022, DOI:10.32604/cmc.2022.028074

    Abstract This article introduces a novel, ultrawideband (UWB) planar monopole antenna printed on Roger RT/5880 substrate in a compact size for small Internet of Things (IoT) applications. The total electrical dimensions of the proposed compact UWB antenna are 0.19 λo × 0.215 λo × 0.0196 λo with the overall physical sizes of 15 mm × 17 mm × 1.548 mm at the lower resonance frequency of 3.8 GHz. The planar monopole antenna is fed through the linearly tapered microstrip line on a partially structured ground plane to achieve optimum impedance matching for UWB operation. The proposed compact UWB… More >

  • Open Access

    ARTICLE

    Efficient Computation Offloading of IoT-Based Workflows Using Discrete Teaching Learning-Based Optimization

    Mohamed K. Hussein1,*, Mohamed H. Mousa1,2

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3685-3703, 2022, DOI:10.32604/cmc.2022.026370

    Abstract As the Internet of Things (IoT) and mobile devices have rapidly proliferated, their computationally intensive applications have developed into complex, concurrent IoT-based workflows involving multiple interdependent tasks. By exploiting its low latency and high bandwidth, mobile edge computing (MEC) has emerged to achieve the high-performance computation offloading of these applications to satisfy the quality-of-service requirements of workflows and devices. In this study, we propose an offloading strategy for IoT-based workflows in a high-performance MEC environment. The proposed task-based offloading strategy consists of an optimization problem that includes task dependency, communication costs, workflow constraints, device energy More >

  • Open Access

    ARTICLE

    Novel Block Chain Technique for Data Privacy and Access Anonymity in Smart Healthcare

    J. Priya*, C. Palanisamy

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 243-259, 2023, DOI:10.32604/iasc.2023.025719

    Abstract The Internet of Things (IoT) and Cloud computing are gaining popularity due to their numerous advantages, including the efficient utilization of internet and computing resources. In recent years, many more IoT applications have been extensively used. For instance, Healthcare applications execute computations utilizing the user’s private data stored on cloud servers. However, the main obstacles faced by the extensive acceptance and usage of these emerging technologies are security and privacy. Moreover, many healthcare data management system applications have emerged, offering solutions for distinct circumstances. But still, the existing system has issues with specific security issues,… More >

  • Open Access

    ARTICLE

    Anomaly Detection Framework in Fog-to-Things Communication for Industrial Internet of Things

    Tahani Alatawi*, Ahamed Aljuhani

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1067-1086, 2022, DOI:10.32604/cmc.2022.029283

    Abstract The rapid development of the Internet of Things (IoT) in the industrial domain has led to the new term the Industrial Internet of Things (IIoT). The IIoT includes several devices, applications, and services that connect the physical and virtual space in order to provide smart, cost-effective, and scalable systems. Although the IIoT has been deployed and integrated into a wide range of industrial control systems, preserving security and privacy of such a technology remains a big challenge. An anomaly-based Intrusion Detection System (IDS) can be an effective security solution for maintaining the confidentiality, integrity, and… More >

  • Open Access

    ARTICLE

    Deep Reinforcement Extreme Learning Machines for Secured Routing in Internet of Things (IoT) Applications

    K. Lavanya1,*, K. Vimala Devi2, B. R. Tapas Bapu3

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 837-848, 2022, DOI:10.32604/iasc.2022.023055

    Abstract Multipath TCP (SMPTCP) has gained more attention as a valuable approach for IoT systems. SMPTCP is introduced as an evolution of Transmission Control Protocol (TCP) to pass packets simultaneously across several routes to completely exploit virtual networks on multi-homed consoles and other network services. The current multipath networking algorithms and simulation software strategies are confronted with sub-flow irregularity issues due to network heterogeneity, and routing configuration issues can be fixed adequately. To overcome the issues, this paper proposes a novel deep reinforcement-based extreme learning machines (DRLELM) approach to examine the complexities between routes, pathways, sub-flows, More >

Displaying 31-40 on page 4 of 57. Per Page