Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (300)
  • Open Access

    ARTICLE

    Enabling Efficient Data Transmission in Wireless Sensor Networks-Based IoT Applications

    Ibraheem Al-Hejri1, Farag Azzedin1,*, Sultan Almuhammadi1, Naeem Firdous Syed2

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4197-4218, 2024, DOI:10.32604/cmc.2024.047117

    Abstract The use of the Internet of Things (IoT) is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices. In critical infrastructure domains like oil and gas supply, intelligent transportation, power grids, and autonomous agriculture, it is essential to guarantee the confidentiality, integrity, and authenticity of data collected and exchanged. However, the limited resources coupled with the heterogeneity of IoT devices make it inefficient or sometimes infeasible to achieve secure data transmission using traditional cryptographic techniques. Consequently, designing a lightweight secure More >

  • Open Access

    ARTICLE

    Research on the Effect of Dance Therapy on Improving Social Communication Ability of Children with Autism

    Xiaorui Cui1, Shan Wang2,*

    International Journal of Mental Health Promotion, Vol.26, No.5, pp. 407-416, 2024, DOI:10.32604/ijmhp.2023.030135

    Abstract Research motivation: Through the 12 weeks dance therapy intervention for children with autism, the purpose is to explore the intervention model of dance therapy for children with autism and the changes in motor ability, social ability, and communication ability of children with autism after dance therapy intervention. The results of the research are expected to expand the intervention mode of dance therapy in my country and provide practical reference for rehabilitation intervention of children with autism. Research methods: 24 autistic boys aged 6 to 12 with mild to moderate symptoms were recruited and screened through the Internet… More >

  • Open Access

    REVIEW

    Federated Learning on Internet of Things: Extensive and Systematic Review

    Meenakshi Aggarwal1, Vikas Khullar1, Sunita Rani2, Thomas André Prola3,4,5, Shyama Barna Bhattacharjee6, Sarowar Morshed Shawon7, Nitin Goyal8,*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 1795-1834, 2024, DOI:10.32604/cmc.2024.049846

    Abstract The proliferation of IoT devices requires innovative approaches to gaining insights while preserving privacy and resources amid unprecedented data generation. However, FL development for IoT is still in its infancy and needs to be explored in various areas to understand the key challenges for deployment in real-world scenarios. The paper systematically reviewed the available literature using the PRISMA guiding principle. The study aims to provide a detailed overview of the increasing use of FL in IoT networks, including the architecture and challenges. A systematic review approach is used to collect, categorize and analyze FL-IoT-based articles.… More >

  • Open Access

    REVIEW

    Recent Developments in Authentication Schemes Used in Machine-Type Communication Devices in Machine-to-Machine Communication: Issues and Challenges

    Shafi Ullah1, Sibghat Ullah Bazai1,*, Mohammad Imran2, Qazi Mudassar Ilyas3,*, Abid Mehmood4, Muhammad Asim Saleem5, Muhmmad Aasim Rafique3, Arsalan Haider6, Ilyas Khan7, Sajid Iqbal3, Yonis Gulzar4, Kauser Hameed3

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 93-115, 2024, DOI:10.32604/cmc.2024.048796

    Abstract Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices (MTCDs) regularly share extensive data without human intervention while making all types of decisions. These decisions may involve controlling sensitive ventilation systems maintaining uniform temperature, live heartbeat monitoring, and several different alert systems. Many of these devices simultaneously share data to form an automated system. The data shared between machine-type communication devices (MTCDs) is prone to risk due to limited computational power, internal memory, and energy capacity. Therefore, securing the… More >

  • Open Access

    ARTICLE

    A Hybrid Cybersecurity Algorithm for Digital Image Transmission over Advanced Communication Channel Models

    Naglaa F. Soliman1, Fatma E. Fadl-Allah2, Walid El-Shafai3,4,*, Mahmoud I. Aly2, Maali Alabdulhafith1, Fathi E. Abd El-Samie1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 201-241, 2024, DOI:10.32604/cmc.2024.046757

    Abstract The efficient transmission of images, which plays a large role in wireless communication systems, poses a significant challenge in the growth of multimedia technology. High-quality images require well-tuned communication standards. The Single Carrier Frequency Division Multiple Access (SC-FDMA) is adopted for broadband wireless communications, because of its low sensitivity to carrier frequency offsets and low Peak-to-Average Power Ratio (PAPR). Data transmission through open-channel networks requires much concentration on security, reliability, and integrity. The data need a space away from unauthorized access, modification, or deletion. These requirements are to be fulfilled by digital image watermarking and… More >

  • Open Access

    ARTICLE

    A Hybrid and Lightweight Device-to-Server Authentication Technique for the Internet of Things

    Shaha Al-Otaibi1, Rahim Khan2,*, Hashim Ali2, Aftab Ahmed Khan2, Amir Saeed3, Jehad Ali4,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3805-3823, 2024, DOI:10.32604/cmc.2024.049017

    Abstract The Internet of Things (IoT) is a smart networking infrastructure of physical devices, i.e., things, that are embedded with sensors, actuators, software, and other technologies, to connect and share data with the respective server module. Although IoTs are cornerstones in different application domains, the device’s authenticity, i.e., of server(s) and ordinary devices, is the most crucial issue and must be resolved on a priority basis. Therefore, various field-proven methodologies were presented to streamline the verification process of the communicating devices; however, location-aware authentication has not been reported as per our knowledge, which is a crucial… More >

  • Open Access

    ARTICLE

    Secrecy Outage Probability Minimization in Wireless-Powered Communications Using an Improved Biogeography-Based Optimization-Inspired Recurrent Neural Network

    Mohammad Mehdi Sharifi Nevisi1, Elnaz Bashir2, Diego Martín3,*, Seyedkian Rezvanjou4, Farzaneh Shoushtari5, Ehsan Ghafourian2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3971-3991, 2024, DOI:10.32604/cmc.2024.047875

    Abstract This paper focuses on wireless-powered communication systems, which are increasingly relevant in the Internet of Things (IoT) due to their ability to extend the operational lifetime of devices with limited energy. The main contribution of the paper is a novel approach to minimize the secrecy outage probability (SOP) in these systems. Minimizing SOP is crucial for maintaining the confidentiality and integrity of data, especially in situations where the transmission of sensitive data is critical. Our proposed method harnesses the power of an improved biogeography-based optimization (IBBO) to effectively train a recurrent neural network (RNN). The… More >

  • Open Access

    ARTICLE

    Chaotic Map-Based Authentication and Key Agreement Protocol with Low-Latency for Metasystem

    Guojun Wang1,2, Qi Liu3,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4471-4488, 2024, DOI:10.32604/cmc.2024.047669

    Abstract With the rapid advancement in exploring perceptual interactions and digital twins, metaverse technology has emerged to transcend the constraints of space-time and reality, facilitating remote AI-based collaboration. In this dynamic metasystem environment, frequent information exchanges necessitate robust security measures, with Authentication and Key Agreement (AKA) serving as the primary line of defense to ensure communication security. However, traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse. To address this challenge and enable nearly latency-free interactions, a novel low-latency AKA protocol based on chaotic maps is proposed. This… More >

  • Open Access

    ARTICLE

    Falcon Optimization Algorithm-Based Energy Efficient Communication Protocol for Cluster-Based Vehicular Networks

    Youseef Alotaibi1, B. Rajasekar2, R. Jayalakshmi3, Surendran Rajendran4,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4243-4262, 2024, DOI:10.32604/cmc.2024.047608

    Abstract Rapid development in Information Technology (IT) has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle (V2V) transmission. Vehicular networks give a safe and more effective driving experience by presenting time-sensitive and location-aware data. The communication occurs directly between V2V and Base Station (BS) units such as the Road Side Unit (RSU), named as a Vehicle to Infrastructure (V2I). However, the frequent topology alterations in VANETs generate several problems with data transmission as the vehicle velocity differs with time. Therefore, the scheme of an effectual routing protocol for reliable and stable communications… More >

  • Open Access

    ARTICLE

    Machine-Learning Based Packet Switching Method for Providing Stable High-Quality Video Streaming in Multi-Stream Transmission

    Yumin Jo1, Jongho Paik2,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4153-4176, 2024, DOI:10.32604/cmc.2024.047046

    Abstract Broadcasting gateway equipment generally uses a method of simply switching to a spare input stream when a failure occurs in a main input stream. However, when the transmission environment is unstable, problems such as reduction in the lifespan of equipment due to frequent switching and interruption, delay, and stoppage of services may occur. Therefore, applying a machine learning (ML) method, which is possible to automatically judge and classify network-related service anomaly, and switch multi-input signals without dropping or changing signals by predicting or quickly determining the time of error occurrence for smooth stream switching when… More >

Displaying 1-10 on page 1 of 300. Per Page