Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (8)
  • Open Access

    ARTICLE

    GestureID: Gesture-Based User Authentication on Smart Devices Using Acoustic Sensing

    Jizhao Liu1,2, Jiang Hui1,2,*, Zhaofa Wang1,2

    Sound & Vibration, Vol.58, pp. 151-169, 2024, DOI:10.32604/sv.2024.045193

    Abstract User authentication on smart devices is crucial to protecting user privacy and device security. Due to the development of emerging attacks, existing physiological feature-based authentication methods, such as fingerprint, iris, and face recognition are vulnerable to forgery and attacks. In this paper, GestureID, a system that utilizes acoustic sensing technology to distinguish hand features among users, is proposed. It involves using a speaker to send acoustic signals and a microphone to receive the echoes affected by the reflection of the hand movements of the users. To ensure system accuracy and effectively distinguish users’ gestures, a second-order differential-based phase extraction method… More >

  • Open Access

    ARTICLE

    IoT Smart Devices Risk Assessment Model Using Fuzzy Logic and PSO

    Ashraf S. Mashaleh1,2,*, Noor Farizah Binti Ibrahim1, Mohammad Alauthman3, Mohammad Almseidin4, Amjad Gawanmeh5

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2245-2267, 2024, DOI:10.32604/cmc.2023.047323

    Abstract Increasing Internet of Things (IoT) device connectivity makes botnet attacks more dangerous, carrying catastrophic hazards. As IoT botnets evolve, their dynamic and multifaceted nature hampers conventional detection methods. This paper proposes a risk assessment framework based on fuzzy logic and Particle Swarm Optimization (PSO) to address the risks associated with IoT botnets. Fuzzy logic addresses IoT threat uncertainties and ambiguities methodically. Fuzzy component settings are optimized using PSO to improve accuracy. The methodology allows for more complex thinking by transitioning from binary to continuous assessment. Instead of expert inputs, PSO data-driven tunes rules and membership functions. This study presents a… More >

  • Open Access

    ARTICLE

    Convolutional Neural Network Model for Fire Detection in Real-Time Environment

    Abdul Rehman, Dongsun Kim*, Anand Paul

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2289-2307, 2023, DOI:10.32604/cmc.2023.036435

    Abstract Disasters such as conflagration, toxic smoke, harmful gas or chemical leakage, and many other catastrophes in the industrial environment caused by hazardous distance from the peril are frequent. The calamities are causing massive fiscal and human life casualties. However, Wireless Sensors Network-based adroit monitoring and early warning of these dangerous incidents will hamper fiscal and social fiasco. The authors have proposed an early fire detection system uses machine and/or deep learning algorithms. The article presents an Intelligent Industrial Monitoring System (IIMS) and introduces an Industrial Smart Social Agent (ISSA) in the Industrial SIoT (ISIoT) paradigm. The proffered ISSA empowers smart… More >

  • Open Access

    ARTICLE

    Detection of Phishing in Internet-of-Things Using Hybrid Deep Belief Network

    S. Ashwini*, S. Magesh Kumar

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3043-3056, 2023, DOI:10.32604/iasc.2023.034551

    Abstract Increase in the use of internet of things owned devices is one of the reasons for increased network traffic. While connecting the smart devices with publicly available network many kinds of phishing attacks are able to enter into the mobile devices and corrupt the existing system. The Phishing is the slow and resilient attack stacking techniques probe the users. The proposed model is focused on detecting phishing attacks in internet of things enabled devices through a robust algorithm called Novel Watch and Trap Algorithm (NWAT). Though Predictive mapping, Predictive Validation and Predictive analysis mechanism is developed. For the test purpose… More >

  • Open Access

    ARTICLE

    A Compact Tri-Band Antenna Based on Inverted-L Stubs for Smart Devices

    Niamat Hussain1, Anees Abbas1, Sang-Myeong Park1, Seong Gyoon Park2, Nam Kim1,*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3321-3331, 2022, DOI:10.32604/cmc.2022.020688

    Abstract We designed and constructed a novel, compact tri-band monopole antenna for intelligent devices. Multiband behavior was achieved by placing inverted-L shaped stubs of various lengths in a triangular monopole antenna fed by a coplanar waveguide. The resonance frequency of each band can be controlled by varying the length of the corresponding stub. Three bands, at 2.4 (2.37–2.51), 3.5 (3.34–3.71), and 5.5 (4.6–6.4) GHz, were easily obtained using three stubs of different lengths. For miniaturization, a portion of the longest stub (at 2.4 GHz) was printed on the opposite side of the substrate, and connected to the main stub via a… More >

  • Open Access

    ARTICLE

    Smart Devices Based Multisensory Approach for Complex Human Activity Recognition

    Muhammad Atif Hanif1, Tallha Akram1, Aamir Shahzad2, Muhammad Attique Khan3, Usman Tariq4, Jung-In Choi5, Yunyoung Nam6,*, Zanib Zulfiqar7

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3221-3234, 2022, DOI:10.32604/cmc.2022.019815

    Abstract Sensors based Human Activity Recognition (HAR) have numerous applications in eHeath, sports, fitness assessments, ambient assisted living (AAL), human-computer interaction and many more. The human physical activity can be monitored by using wearable sensors or external devices. The usage of external devices has disadvantages in terms of cost, hardware installation, storage, computational time and lighting conditions dependencies. Therefore, most of the researchers used smart devices like smart phones, smart bands and watches which contain various sensors like accelerometer, gyroscope, GPS etc., and adequate processing capabilities. For the task of recognition, human activities can be broadly categorized as basic and complex… More >

  • Open Access

    ARTICLE

    A Lightweight Anonymous Device Authentication Scheme for Information-Centric Distribution Feeder Microgrid

    Anhao Xiang, Jun Zheng*

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2141-2158, 2021, DOI:10.32604/cmc.2021.018808

    Abstract Distribution feeder microgrid (DFM) built based on existing distributed feeder (DF), is a promising solution for modern microgrid. DFM contains a large number of heterogeneous devices that generate heavy network traffice and require a low data delivery latency. The information-centric networking (ICN) paradigm has shown a great potential to address the communication requirements of smart grid. However, the integration of advanced information and communication technologies with DFM make it vulnerable to cyber attacks. Adequate authentication of grid devices is essential for preventing unauthorized accesses to the grid network and defending against cyber attacks. In this paper, we propose a new… More >

  • Open Access

    ARTICLE

    Robust Cluster-Based Routing Protocol for IoT-Assisted Smart Devices in WSN

    Maryam Shafiq1, Humaira Ashraf1, Ata Ullah2, Mehedi Masud3, Muhammad Azeem2, N. Z. Jhanjhi4,*, Mamoona Humayun5

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3505-3521, 2021, DOI:10.32604/cmc.2021.015533

    Abstract The Internet of Things (IoT) is gaining attention because of its broad applicability, especially by integrating smart devices for massive communication during sensing tasks. IoT-assisted Wireless Sensor Networks (WSN) are suitable for various applications like industrial monitoring, agriculture, and transportation. In this regard, routing is challenging to find an efficient path using smart devices for transmitting the packets towards big data repositories while ensuring efficient energy utilization. This paper presents the Robust Cluster Based Routing Protocol (RCBRP) to identify the routing paths where less energy is consumed to enhances the network lifespan. The scheme is presented in six phases to… More >

Displaying 1-10 on page 1 of 8. Per Page