Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (289)
  • Open Access

    ARTICLE

    An End-to-End Authentication Scheme for Healthcare IoT Systems Using WMSN

    Shadi Nashwan*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 607-642, 2021, DOI:10.32604/cmc.2021.015597

    Abstract The healthcare internet of things (IoT) system has dramatically reshaped this important industry sector. This system employs the latest technology of IoT and wireless medical sensor networks to support the reliable connection of patients and healthcare providers. The goal is the remote monitoring of a patient’s physiological data by physicians. Moreover, this system can reduce the number and expenses of healthcare centers, make up for the shortage of healthcare centers in remote areas, enable consultation with expert physicians around the world, and increase the health awareness of communities. The major challenges that affect the rapid deployment and widespread acceptance of… More >

  • Open Access

    ARTICLE

    Impact of Tools and Techniques for Securing Consultancy Services

    Wael Alosaimi1, Abdullah Alharbi1, Hashem Alyami2, Masood Ahmad3, Abhishek Kumar Pandey3, Rajeev Kumar3,4,*, Raees Ahmad Khan3

    Computer Systems Science and Engineering, Vol.37, No.3, pp. 347-360, 2021, DOI:10.32604/csse.2021.015284

    Abstract In a digital world moving at a breakneck speed, consultancy services have emerged as one of the prominent resources for seeking effective, sustainable and economically viable solutions to a given crisis. The present day consultancy services are aided by the use of multiple tools and techniques. However, ensuring the security of these tools and techniques is an important concern for the consultants because even a slight malfunction of any tool could alter the results drastically. Consultants usually tackle these functions after establishing the clients’ needs and developing the appropriate strategy. Nevertheless, most of the consultants tend to focus more on… More >

  • Open Access

    ARTICLE

    Service-Aware Access Control Procedure for Blockchain Assisted Real-Time Applications

    Alaa Omran Almagrabi1,*, A. K. Bashir2

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3649-3667, 2021, DOI:10.32604/cmc.2021.015056

    Abstract The design of distributed ledger, Asymmetric Key Algorithm (AKA) blockchain systems, is prominent in administering security and access control in various real-time services and applications. The assimilation of blockchain systems leverages the reliable access and secure service provisioning of the services. However, the distributed ledger technology’s access control and chained decisions are defaced by pervasive and service unawareness. It results in degrading security through unattended access control for limited-service users. In this article, a service-aware access control procedure (SACP) is introduced to address the afore-mentioned issue. The proposed SACP defines attended access control for all the service session by identifying… More >

  • Open Access

    ARTICLE

    Computing the User Experience via Big Data Analysis: A Case of Uber Services

    Jang Hyun Kim1,2, Dongyan Nan1,*, Yerin Kim2, Min Hyung Park2

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 2819-2829, 2021, DOI:10.32604/cmc.2021.014922

    Abstract As of 2020, the issue of user satisfaction has generated a significant amount of interest. Therefore, we employ a big data approach for exploring user satisfaction among Uber users. We develop a research model of user satisfaction by expanding the list of user experience (UX) elements (i.e., pragmatic, expectation confirmation, hedonic, and burden) by including more elements, namely: risk, cost, promotion, anxiety, sadness, and anger. Subsequently, we collect 125,768 comments from online reviews of Uber services and perform a sentiment analysis to extract the UX elements. The results of a regression analysis reveal the following: hedonic, promotion, and pragmatic significantly… More >

  • Open Access

    ARTICLE

    Integrity Assessment of Medical Devices for Improving Hospital Services

    Fahad A. Alzahrani1, Masood Ahmad2, Mohd Nadeem2, Rajeev Kumar2,3,*, Raees Ahmad Khan2

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3619-3633, 2021, DOI:10.32604/cmc.2021.014869

    Abstract The present study examines the various techniques being used to maintain the integrity of the medical devices, and develops a quantitative framework to list these in the sequence of priority. To achieve the intended objective, the study employs the combined procedure of Fuzzy Analytic Network Process (ANP) and Fuzzy Technical for Order Preference by Similarities to Ideal Solution (TOPSIS). We selected fuzzy based decision making techniques for assessing the integrity of medical devices. The suggested methodology was then used for classifying the suitable techniques used to evaluate the integrity of medical devices. Different techniques or the procedures of integrity assessment… More >

  • Open Access

    ARTICLE

    Prediction of Cloud Ranking in a Hyperconverged Cloud Ecosystem Using Machine Learning

    Nadia Tabassum1, Allah Ditta2, Tahir Alyas3, Sagheer Abbas4, Hani Alquhayz5, Natash Ali Mian6, Muhammad Adnan Khan7,*

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3129-3141, 2021, DOI:10.32604/cmc.2021.014729

    Abstract Cloud computing is becoming popular technology due to its functional properties and variety of customer-oriented services over the Internet. The design of reliable and high-quality cloud applications requires a strong Quality of Service QoS parameter metric. In a hyperconverged cloud ecosystem environment, building high-reliability cloud applications is a challenging job. The selection of cloud services is based on the QoS parameters that play essential roles in optimizing and improving cloud rankings. The emergence of cloud computing is significantly reshaping the digital ecosystem, and the numerous services offered by cloud service providers are playing a vital role in this transformation. Hyperconverged… More >

  • Open Access

    ARTICLE

    Secure Localization Based Authentication (SLA) Strategy for Data Integrity in WNS

    V. Manikandan1,*, M. Sivaram1, Amin Salih Mohammed2, V. Porkodi3, K. Shankar4

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 4005-4018, 2021, DOI:10.32604/cmc.2021.014643

    Abstract Wireless Sensor Networks (WSN) has been extensively utilized as a communication model in Internet of Things (IoT). As well, to offer service, numerous IoT based applications need effective transmission over unstable locations. To ensure reliability, prevailing investigations exploit multiple candidate forwarders over geographic opportunistic routing in WSNs. Moreover, these models are affected by crucial denial of service (DoS) attacks, where huge amount of invalid data are delivered intentionally to the receivers to disturb the functionality of WSNs. Here, secure localization based authentication (SLA) is presented to fight against DoS attack, and to fulfil the need of reliability and authentication. By… More >

  • Open Access

    ARTICLE

    State-Based Offloading Model for Improving Response Rate of IoT Services

    K. Sakthidasan1, Bhekisipho Twala2, S. Yuvaraj3, K. Vijayan3,*, S. Praveenkumar3, Prashant Mani4, C. Bharatiraja3

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3721-3735, 2021, DOI:10.32604/cmc.2021.014321

    Abstract The Internet of Things (IoT) is a heterogeneous information sharing and access platform that provides services in a pervasive manner. Task and computation offloading in the IoT helps to improve the response rate and the availability of resources. Task offloading in a service-centric IoT environment mitigates the complexity in response delivery and request processing. In this paper, the state-based task offloading method (STOM) is introduced with a view to maximize the service response rate and reduce the response time of the varying request densities. The proposed method is designed using the Markov decision-making model to improve the rate of requests… More >

  • Open Access

    ARTICLE

    Quality of Service Aware Cluster Routing in Vehicular Ad Hoc Networks

    Ishtiaq Wahid1, Fasee Ullah2,*, Masood Ahmad1, Atif Khan3, M. Irfan Uddin4, Abdullah Alharbi5, Wael Alosaimi5

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3949-3965, 2021, DOI:10.32604/cmc.2021.014190

    Abstract In vehicular ad hoc networks (VANETs), the topology information (TI) is updated frequently due to vehicle mobility. These frequent changes in topology increase the topology maintenance overhead. To reduce the control message overhead, cluster-based routing schemes are proposed. In cluster-based routing schemes, the nodes are divided into different virtual groups, and each group (logical node) is considered a cluster. The topology changes are accommodated within each cluster, and broadcasting TI to the whole VANET is not required. The cluster head (CH) is responsible for managing the communication of a node with other nodes outside the cluster. However, transmitting real-time data… More >

  • Open Access

    ARTICLE

    A Data Security Framework for Cloud Computing Services

    Luis-Eduardo Bautista-Villalpando1,*, Alain Abran2

    Computer Systems Science and Engineering, Vol.37, No.2, pp. 203-218, 2021, DOI:10.32604/csse.2021.015437

    Abstract Cyberattacks are difficult to prevent because the targeted companies and organizations are often relying on new and fundamentally insecure cloud-based technologies, such as the Internet of Things. With increasing industry adoption and migration of traditional computing services to the cloud, one of the main challenges in cybersecurity is to provide mechanisms to secure these technologies. This work proposes a Data Security Framework for cloud computing services (CCS) that evaluates and improves CCS data security from a software engineering perspective by evaluating the levels of security within the cloud computing paradigm using engineering methods and techniques applied to CCS. This framework… More >

Displaying 201-210 on page 21 of 289. Per Page