Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (711)
  • Open Access

    ARTICLE

    Evaluation of Industrial IoT Service Providers with TOPSIS Based on Circular Intuitionistic Fuzzy Sets

    Elif Çaloğlu Büyükselçuk*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 715-746, 2024, DOI:10.32604/cmc.2024.052509

    Abstract Industrial Internet of Things (IIoT) service providers have become increasingly important in the manufacturing industry due to their ability to gather and process vast amounts of data from connected devices, enabling manufacturers to improve operational efficiency, reduce costs, and enhance product quality. These platforms provide manufacturers with real-time visibility into their production processes and supply chains, allowing them to optimize operations and make informed decisions. In addition, IIoT service providers can help manufacturers create new revenue streams through the development of innovative products and services and enable them to leverage the benefits of emerging technologies… More >

  • Open Access

    ARTICLE

    MUS Model: A Deep Learning-Based Architecture for IoT Intrusion Detection

    Yu Yan1, Yu Yang1,*, Shen Fang1, Minna Gao2, Yiding Chen1

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 875-896, 2024, DOI:10.32604/cmc.2024.051685

    Abstract In the face of the effective popularity of the Internet of Things (IoT), but the frequent occurrence of cybersecurity incidents, various cybersecurity protection means have been proposed and applied. Among them, Intrusion Detection System (IDS) has been proven to be stable and efficient. However, traditional intrusion detection methods have shortcomings such as low detection accuracy and inability to effectively identify malicious attacks. To address the above problems, this paper fully considers the superiority of deep learning models in processing high-dimensional data, and reasonable data type conversion methods can extract deep features and detect classification using… More >

  • Open Access

    ARTICLE

    Cloud-Edge Collaborative Federated GAN Based Data Processing for IoT-Empowered Multi-Flow Integrated Energy Aggregation Dispatch

    Zhan Shi*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 973-994, 2024, DOI:10.32604/cmc.2024.051530

    Abstract The convergence of Internet of Things (IoT), 5G, and cloud collaboration offers tailored solutions to the rigorous demands of multi-flow integrated energy aggregation dispatch data processing. While generative adversarial networks (GANs) are instrumental in resource scheduling, their application in this domain is impeded by challenges such as convergence speed, inferior optimality searching capability, and the inability to learn from failed decision making feedbacks. Therefore, a cloud-edge collaborative federated GAN-based communication and computing resource scheduling algorithm with long-term constraint violation sensitiveness is proposed to address these challenges. The proposed algorithm facilitates real-time, energy-efficient data processing by More >

  • Open Access

    ARTICLE

    QBIoT: A Quantum Blockchain Framework for IoT with an Improved Proof-of-Authority Consensus Algorithm and a Public-Key Quantum Signature

    Ang Liu1, Qing Zhang2, Shengwei Xu3,*, Huamin Feng4, Xiu-bo Chen5, Wen Liu1

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1727-1751, 2024, DOI:10.32604/cmc.2024.051233

    Abstract The Internet of Things (IoT) is a network system that connects physical devices through the Internet, allowing them to interact. Nowadays, IoT has become an integral part of our lives, offering convenience and smart functionality. However, the growing number of IoT devices has brought about a corresponding increase in cybersecurity threats, such as device vulnerabilities, data privacy concerns, and network susceptibilities. Integrating blockchain technology with IoT has proven to be a promising approach to enhance IoT security. Nevertheless, the emergence of quantum computing poses a significant challenge to the security of traditional classical cryptography used… More >

  • Open Access

    ARTICLE

    Passive IoT Localization Technology Based on SD-PDOA in NLOS and Multi-Path Environments

    Junyang Liu1, Yuan Li2, Yulu Zhang2, Shuai Ma2, Gui Li3, Yi He1, Haiwen Yi1, Yue Liu1, Xiaotao Xu4, Xu Zhang1, Jinyao He1, Guangjun Wen1, Jian Li1,*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 913-930, 2024, DOI:10.32604/cmc.2024.049999

    Abstract Addressing the challenges of passive Radio Frequency Identification (RFID) indoor localization technology in Non-Line-of-Sight (NLoS) and multipath environments, this paper presents an innovative approach by introducing a combined technology integrating an improved Kalman Filter with Space Domain Phase Difference of Arrival (SD-PDOA) and Received Signal Strength Indicator (RSSI). This methodology utilizes the distinct channel characteristics in multipath and NLoS contexts to effectively filter out interference and accurately extract localization information, thereby facilitating high precision and stability in passive RFID localization. The efficacy of this approach is demonstrated through detailed simulations and empirical tests conducted on… More >

  • Open Access

    REVIEW

    Aldo-keto reductases: Role in cancer development and theranostics

    SIDDAVARAM NAGINI1, PRATHAP REDDY KALLAMADI2, KRANTHI KIRAN KISHORE TANAGALA3, GEEREDDY BHANUPRAKASH REDDY2,*

    Oncology Research, Vol.32, No.8, pp. 1287-1308, 2024, DOI:10.32604/or.2024.049918

    Abstract Aldo-keto reductases (AKRs) are a superfamily of enzymes that play crucial roles in various cellular processes, including the metabolism of xenobiotics, steroids, and carbohydrates. A growing body of evidence has unveiled the involvement of AKRs in the development and progression of various cancers. AKRs are aberrantly expressed in a wide range of malignant tumors. Dysregulated expression of AKRs enables the acquisition of hallmark traits of cancer by activating oncogenic signaling pathways and contributing to chemoresistance. AKRs have emerged as promising oncotherapeutic targets given their pivotal role in cancer development and progression. Inhibition of aldose reductase… More >

  • Open Access

    REVIEW

    IoMT-Based Healthcare Systems: A Review

    Tahir Abbas1,*, Ali Haider Khan2, Khadija Kanwal3, Ali Daud4,*, Muhammad Irfan5, Amal Bukhari6, Riad Alharbey6

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 871-895, 2024, DOI:10.32604/csse.2024.049026

    Abstract The integration of the Internet of Medical Things (IoMT) and the Internet of Things (IoT), which has revolutionized patient care through features like remote critical care and real-time therapy, is examined in this study in response to the changing healthcare landscape. Even with these improvements, security threats are associated with the increased connectivity of medical equipment, which calls for a thorough assessment. With a primary focus on addressing security and performance enhancement challenges, the research classifies current IoT communication devices, examines their applications in IoMT, and investigates important aspects of IoMT devices in healthcare. The More >

  • Open Access

    ARTICLE

    Reducing the Encrypted Data Size: Healthcare with IoT-Cloud Computing Applications

    Romaissa Kebache1, Abdelkader Laouid1,*, Ahcene Bounceur2, Mostefa Kara1,3, Konstantinos Karampidis4, Giorgos Papadourakis4, Mohammad Hammoudeh2

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 1055-1072, 2024, DOI:10.32604/csse.2024.048738

    Abstract Internet cloud services come at a price, especially when they provide top-tier security measures. The cost incurred by cloud utilization is directly proportional to the storage requirements. Companies are always looking to increase profits and reduce costs while preserving the security of their data by encrypting them. One of the offered solutions is to find an efficient encryption method that can store data in a much smaller space than traditional encryption techniques. This article introduces a novel encryption approach centered on consolidating information into a single ciphertext by implementing Multi-Key Embedded Encryption (MKEE). The effectiveness… More >

  • Open Access

    ARTICLE

    Intelligent Image Text Detection via Pixel Standard Deviation Representation

    Sana Sahar Guia1, Abdelkader Laouid1, Mohammad Hammoudeh2,*, Mostafa Kara1,3

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 915-935, 2024, DOI:10.32604/csse.2024.046414

    Abstract Artificial intelligence has been involved in several domains. Despite the advantages of using artificial intelligence techniques, some crucial limitations prevent them from being implemented in specific domains and locations. The accuracy, poor quality of gathered data, and processing time are considered major concerns in implementing machine learning techniques, certainly in low-end smart devices. This paper aims to introduce a novel pre-treatment technique dedicated to image text detection that uses the images’ pixel divergence and similarity to reduce the image size. Mitigating the image size while keeping its features improves the model training time with an… More >

  • Open Access

    ARTICLE

    Dynamic Hypergraph Modeling and Robustness Analysis for SIoT

    Yue Wan, Nan Jiang*, Ziyu Liu

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 3017-3034, 2024, DOI:10.32604/cmes.2024.051101

    Abstract The Social Internet of Things (SIoT) integrates the Internet of Things (IoT) and social networks, taking into account the social attributes of objects and diversifying the relationship between humans and objects, which overcomes the limitations of the IoT’s focus on associations between objects. Artificial Intelligence (AI) technology is rapidly evolving. It is critical to build trustworthy and transparent systems, especially with system security issues coming to the surface. This paper emphasizes the social attributes of objects and uses hypergraphs to model the diverse entities and relationships in SIoT, aiming to build an SIoT hypergraph generation… More >

Displaying 1-10 on page 1 of 711. Per Page