Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (18)
  • Open Access

    ARTICLE

    Efficient and Secure IoT Based Smart Home Automation Using Multi-Model Learning and Blockchain Technology

    Nazik Alturki1, Raed Alharthi2, Muhammad Umer3,*, Oumaima Saidani1, Amal Alshardan1, Reemah M. Alhebshi4, Shtwai Alsubai5, Ali Kashif Bashir6,7,8,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3387-3415, 2024, DOI:10.32604/cmes.2023.044700

    Abstract The concept of smart houses has grown in prominence in recent years. Major challenges linked to smart homes are identification theft, data safety, automated decision-making for IoT-based devices, and the security of the device itself. Current home automation systems try to address these issues but there is still an urgent need for a dependable and secure smart home solution that includes automatic decision-making systems and methodical features. This paper proposes a smart home system based on ensemble learning of random forest (RF) and convolutional neural networks (CNN) for programmed decision-making tasks, such as categorizing gadgets as “OFF” or “ON” based… More >

  • Open Access

    ARTICLE

    Recognition of Human Actions through Speech or Voice Using Machine Learning Techniques

    Oscar Peña-Cáceres1,2,*, Henry Silva-Marchan3, Manuela Albert4, Miriam Gil1

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1873-1891, 2023, DOI:10.32604/cmc.2023.043176

    Abstract The development of artificial intelligence (AI) and smart home technologies has driven the need for speech recognition-based solutions. This demand stems from the quest for more intuitive and natural interaction between users and smart devices in their homes. Speech recognition allows users to control devices and perform everyday actions through spoken commands, eliminating the need for physical interfaces or touch screens and enabling specific tasks such as turning on or off the light, heating, or lowering the blinds. The purpose of this study is to develop a speech-based classification model for recognizing human actions in the smart home. It seeks… More >

  • Open Access

    ARTICLE

    Power Scheduling with Max User Comfort in Smart Home: Performance Analysis and Tradeoffs

    Muhammad Irfan1, Ch. Anwar Ul Hassan2, Faisal Althobiani3, Nasir Ayub4,*, Raja Jalees Ul Hussen Khan5, Emad Ismat Ghandourah6, Majid A. Almas7, Saleh Mohammed Ghonaim3, V. R. Shamji3, Saifur Rahman1

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1723-1740, 2023, DOI:10.32604/csse.2023.035141

    Abstract The smart grid has enabled users to control their home energy more effectively and efficiently. A home energy management system (HEM) is a challenging task because this requires the most effective scheduling of intelligent home appliances to save energy. Here, we presented a meta-heuristic-based HEM system that integrates the Greywolf Algorithm (GWA) and Harmony Search Algorithms (HSA). Moreover, a fusion initiated on HSA and GWA operators is used to optimize energy intake. Furthermore, many knapsacks are being utilized to ensure that peak-hour load usage for electricity customers does not surpass a certain edge. Hybridization has proven beneficial in achieving numerous… More >

  • Open Access

    ARTICLE

    Edge-Cloud Computing for Scheduling the Energy Consumption in Smart Grid

    Abdulaziz Alorf*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 273-286, 2023, DOI:10.32604/csse.2023.035437

    Abstract Nowadays, smart electricity grids are managed through advanced tools and techniques. The advent of Artificial Intelligence (AI) and network technology helps to control the energy demand. These advanced technologies can resolve common issues such as blackouts, optimal energy generation costs, and peak-hours congestion. In this paper, the residential energy demand has been investigated and optimized to enhance the Quality of Service (QoS) to consumers. The energy consumption is distributed throughout the day to fulfill the demand in peak hours. Therefore, an Edge-Cloud computing-based model is proposed to schedule the energy demand with reward-based energy consumption. This model gives priority to… More >

  • Open Access

    ARTICLE

    Temporal Preferences-Based Utility Control for Smart Homes

    Salman Naseer1, Raheela Saleem2, Muhammad Mudasar Ghafoor3, Shahzada Khurram4, Shafiq Ahmad5, Abdelaty Edrees Sayed5, Muhammad Shafiq6,*, Jin-Ghoo Choi6

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1699-1714, 2023, DOI:10.32604/iasc.2023.034032

    Abstract The residential sector contributes a large part of the energy to the global energy balance. To date, housing demand has mostly been uncontrollable and inelastic to grid conditions. Analyzing the performance of a home energy management system requires the creation of various profiles of real-world residential demand, as residential demand is complex and includes multiple factors such as occupancy, climate, user preferences, and appliance types. Average Peak Ratio (A2P) is one of the most important parameters when managing an efficient and cost-effective energy system. At the household level, the larger relative magnitudes of certain energy devices make managing this ratio… More >

  • Open Access

    ARTICLE

    Intelligent Energy Consumption For Smart Homes Using Fused Machine-Learning Technique

    Hanadi AlZaabi1, Khaled Shaalan1, Taher M. Ghazal2,3,*, Muhammad A. Khan4,5, Sagheer Abbas6, Beenu Mago7, Mohsen A. A. Tomh6, Munir Ahmad6

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 2261-2278, 2023, DOI:10.32604/cmc.2023.031834

    Abstract Energy is essential to practically all exercises and is imperative for the development of personal satisfaction. So, valuable energy has been in great demand for many years, especially for using smart homes and structures, as individuals quickly improve their way of life depending on current innovations. However, there is a shortage of energy, as the energy required is higher than that produced. Many new plans are being designed to meet the consumer’s energy requirements. In many regions, energy utilization in the housing area is 30%–40%. The growth of smart homes has raised the requirement for intelligence in applications such as… More >

  • Open Access

    ARTICLE

    Smart Home IoT Privacy and Security Preservation via Machine Learning Techniques

    Mubarak Almutairi*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1959-1983, 2023, DOI:10.32604/cmc.2023.031155

    Abstract The development and use of Internet of Things (IoT) devices have grown significantly in recent years. Advanced IoT device characteristics are mainly to blame for the wide range of applications that may now be achieved with IoT devices. Corporations have begun to embrace the IoT concept. Identifying true and suitable devices, security faults that might be used for bad reasons, and administration of such devices are only a few of the issues that IoT, a new concept in technological progress, provides. In some ways, IoT device traffic differs from regular device traffic. Devices with particular features can be classified into… More >

  • Open Access

    ARTICLE

    Internet of Things for in Home Health Based Monitoring System: Modern Advances, Challenges and Future Directions

    Omer Iqbal*, Tayyeba Iftakhar, Saleem Zubair Ahmad

    Journal on Internet of Things, Vol.4, No.1, pp. 35-55, 2022, DOI:10.32604/jiot.2022.022256

    Abstract IOT has carried out important function in converting the traditional fitness care corporation. With developing call for in population, traditional healthcare structures have reached their outmost functionality in presenting sufficient and as plenty as mark offerings. The worldwide is handling devastating developing antique population disaster and the right want for assisted-dwelling environments is turning into inevitable for senior citizens. There furthermore a determination by means of the use of way of countrywide healthcare organizations to increase crucial manual for individualized, right blanketed care to prevent and manipulate excessive coronial situations. Many tech orientated packages related to Health Monitoring have been… More >

  • Open Access

    ARTICLE

    Blockchain-Based Robust Data Security Scheme in IoT-Enabled Smart Home

    Anusha Vangala1, Ashok Kumar Das1, YoungHo Park2,*, Sajjad Shaukat Jamal3

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3549-3570, 2022, DOI:10.32604/cmc.2022.025660

    Abstract The recent surge in development of smart homes and smart cities can be observed in many developed countries. While the idea to control devices that are in home (embedded with the Internet of Things (IoT) smart devices) by the user who is outside the home might sound fancy, but it comes with a lot of potential threats. There can be many attackers who will be trying to take advantage of this. So, there is a need for designing a secure scheme which will be able to distinguish among genuine/authorized users of the system and attackers. And knowing about the details… More >

  • Open Access

    ARTICLE

    GDPR Compliance IoT Authentication Model for Smart Home Environment

    Hisham Raad Jafer Merzeh1,*, Mustafa Kara2, Muhammed Ali Aydın3, Hasan Hüseyin Balık1

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1953-1970, 2022, DOI:10.32604/iasc.2022.021297

    Abstract The Internet of things (IoT) became quickly one of the most popular and most discussed topics in research. Studies paid attention to the Internet stuff, primarily to new products that aim to achieve greater efficiency and simplicity in life. IoT may cover several fields of the smart environment. Because of the data exposure that occurs when data is transferred via various channels, data protection issues have become a major problem as the company continues to expand. When user privacy and property are taken into consideration, the situation may become much worse. As a result, the authentication process for communicating entities… More >

Displaying 1-10 on page 1 of 18. Per Page