Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (53)
  • Open Access

    ARTICLE

    TinyML-Based Classification in an ECG Monitoring Embedded System

    Eunchan Kim1, Jaehyuk Kim2, Juyoung Park3, Haneul Ko4, Yeunwoong Kyung5,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1751-1764, 2023, DOI:10.32604/cmc.2023.031663

    Abstract Recently, the development of the Internet of Things (IoT) has enabled continuous and personal electrocardiogram (ECG) monitoring. In the ECG monitoring system, classification plays an important role because it can select useful data (i.e., reduce the size of the dataset) and identify abnormal data that can be used to detect the clinical diagnosis and guide further treatment. Since the classification requires computing capability, the ECG data are usually delivered to the gateway or the server where the classification is performed based on its computing resource. However, real-time ECG data transmission continuously consumes battery and network resources, which are expensive and… More >

  • Open Access

    ARTICLE

    Authentication of WSN for Secured Medical Data Transmission Using Diffie Hellman Algorithm

    A. Jenice Prabhu1,*, D. Hevin Rajesh2

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2363-2376, 2023, DOI:10.32604/csse.2023.028089

    Abstract The applications of wireless sensor network (WSN) exhibits a significant rise in recent days since it is enveloped with various advantageous benefits. In the medical field, the emergence of WSN has created marvelous changes in monitoring the health conditions of the patients and so it is attracted by doctors and physicians. WSN assists in providing health care services without any delay and so it plays predominant role in saving the life of human. The data of different persons, time, places and networks have been linked with certain devices, which are collectively known as Internet of Things (IOT); it is regarded… More >

  • Open Access

    ARTICLE

    Improved Ant Colony Optimization and Machine Learning Based Ensemble Intrusion Detection Model

    S. Vanitha1,*, P. Balasubramanie2

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 849-864, 2023, DOI:10.32604/iasc.2023.032324

    Abstract Internet of things (IOT) possess cultural, commercial and social effect in life in the future. The nodes which are participating in IOT network are basically attracted by the cyber-attack targets. Attack and identification of anomalies in IoT infrastructure is a growing problem in the IoT domain. Machine Learning Based Ensemble Intrusion Detection (MLEID) method is applied in order to resolve the drawback by minimizing malicious actions in related botnet attacks on Message Queue Telemetry Transport (MQTT) and Hyper-Text Transfer Protocol (HTTP) protocols. The proposed work has two significant contributions which are a selection of features and detection of attacks. New… More >

  • Open Access

    ARTICLE

    COVID-19 Outbreak Prediction by Using Machine Learning Algorithms

    Tahir Sher1, Abdul Rehman2, Dongsun Kim2,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1561-1574, 2023, DOI:10.32604/cmc.2023.032020

    Abstract COVID-19 is a contagious disease and its several variants put under stress in all walks of life and economy as well. Early diagnosis of the virus is a crucial task to prevent the spread of the virus as it is a threat to life in the whole world. However, with the advancement of technology, the Internet of Things (IoT) and social IoT (SIoT), the versatile data produced by smart devices helped a lot in overcoming this lethal disease. Data mining is a technique that could be used for extracting useful information from massive data. In this study, we used five… More >

  • Open Access

    ARTICLE

    Intelligent Traffic Scheduling for Mobile Edge Computing in IoT via Deep Learning

    Shaoxuan Yun, Ying Chen*

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.3, pp. 1815-1835, 2023, DOI:10.32604/cmes.2022.022797

    Abstract Nowadays, with the widespread application of the Internet of Things (IoT), mobile devices are renovating our lives. The data generated by mobile devices has reached a massive level. The traditional centralized processing is not suitable for processing the data due to limited computing power and transmission load. Mobile Edge Computing (MEC) has been proposed to solve these problems. Because of limited computation ability and battery capacity, tasks can be executed in the MEC server. However, how to schedule those tasks becomes a challenge, and is the main topic of this piece. In this paper, we design an efficient intelligent algorithm… More >

  • Open Access

    ARTICLE

    An IoT-Based Energy Conservation Smart Classroom System

    Talal H. Noor1,*, El-Sayed Atlam2, Abdulqader M. Almars1, Ayman Noor3, Amer S. Malki1

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3785-3799, 2023, DOI:10.32604/iasc.2023.032250

    Abstract With the increase of energy consumption worldwide in several domains such as industry, education, and transportation, several technologies played an influential role in energy conservation such as the Internet of Things (IoT). In this article, we describe the design and implementation of an IoT-based energy conservation smart classroom system that contributes to energy conservation in the education domain. The proposed system not only allows the user to access and control IoT devices (e.g., lights, projectors, and air conditions) in real-time, it also has the capability to aggregate the estimated energy consumption of an IoT device, the smart classroom, and the… More >

  • Open Access

    ARTICLE

    Routing with Cooperative Nodes Using Improved Learning Approaches

    R. Raja1,*, N. Satheesh2, J. Britto Dennis3, C. Raghavendra4

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 2857-2874, 2023, DOI:10.32604/iasc.2023.026153

    Abstract In IoT, routing among the cooperative nodes plays an incredible role in fulfilling the network requirements and enhancing system performance. The evaluation of optimal routing and related routing parameters over the deployed network environment is challenging. This research concentrates on modelling a memory-based routing model with Stacked Long Short Term Memory (s − LSTM) and Bi-directional Long Short Term Memory (b − LSTM). It is used to hold the routing information and random routing to attain superior performance. The proposed model is trained based on the searching and detection mechanisms to compute the packet delivery ratio (PDR), end-to-end (E2E) delay, throughput, etc. The anticipated… More >

  • Open Access

    ARTICLE

    A Multi-Stage Secure IoT Authentication Protocol

    Khalid Alhusayni1, Raniyah Wazirali1, Mousa AlAkhras1,2, Marwah Almasri1,*, Samah Alhazmi1

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 459-481, 2023, DOI:10.32604/csse.2023.028536

    Abstract The Internet of Things (IoT) is a network of heterogeneous and smart devices that can make decisions without human intervention. It can connect millions of devices across the universe. Their ability to collect information, perform analysis, and even come to meaningful conclusions without human capital intervention matters. Such circumstances require stringent security measures and, in particular, the extent of authentication. Systems applied in the IoT paradigm point out high-interest levels since enormous damage will occur if a malicious, wrongly authenticated device finds its way into the IoT system. This research provides a clear and updated view of the trends in… More >

  • Open Access

    ARTICLE

    A Dynamic Management Scheme for Internet of Things (IoT) Environments: Simulation and Performance Evaluation

    Omar Said*

    CMES-Computer Modeling in Engineering & Sciences, Vol.133, No.3, pp. 673-695, 2022, DOI:10.32604/cmes.2022.021160

    Abstract In recent years, the Internet of Things (IoT) technology has been considered one of the most attractive fields for researchers due to its aspirations and implications for society and life as a whole. The IoT environment contains vast numbers of devices, equipment, and heterogeneous users who generate massive amounts of data. Furthermore, things’ entry into and exit from IoT systems occur dynamically, changing the topology and content of IoT networks very quickly. Therefore, managing IoT environments is among the most pressing challenges. This paper proposes an adaptive and dynamic scheme for managing IoT environments is proposed. This management scheme depends… More >

  • Open Access

    ARTICLE

    Mutated Leader Sine-Cosine Algorithm for Secure Smart IoT-Blockchain of Industry 4.0

    Mustufa Haider Abidi*, Hisham Alkhalefah, Muneer Khan Mohammed

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5367-5383, 2022, DOI:10.32604/cmc.2022.030018

    Abstract In modern scenarios, Industry 4.0 entails invention with various advanced technology, and blockchain is one among them. Blockchains are incorporated to enhance privacy, data transparency as well as security for both large and small scale enterprises. Industry 4.0 is considered as a new synthesis fabrication technique that permits the manufacturers to attain their target effectively. However, because numerous devices and machines are involved, data security and privacy are always concerns. To achieve intelligence in Industry 4.0, blockchain technologies can overcome potential cybersecurity constraints. Nowadays, the blockchain and internet of things (IoT) are gaining more attention because of their favorable outcome… More >

Displaying 21-30 on page 3 of 53. Per Page