Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (680)
  • Open Access

    ARTICLE

    Intelligent Real-Time IoT Traffic Steering in 5G Edge Networks

    Sa Math1, Prohim Tam1, Seokhoon Kim2,*

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3433-3450, 2021, DOI:10.32604/cmc.2021.015490

    Abstract In the Next Generation Radio Networks (NGRN), there will be extreme massive connectivity with the Heterogeneous Internet of Things (HetIoT) devices. The millimeter-Wave (mmWave) communications will become a potential core technology to increase the capacity of Radio Networks (RN) and enable Multiple-Input and Multiple-Output (MIMO) of Radio Remote Head (RRH) technology. However, the challenging key issues in unfair radio resource handling remain unsolved when massive requests are occurring concurrently. The imbalance of resource utilization is one of the main issues occurs when there is overloaded connectivity to the closest RRH receiving exceeding requests. To handle this issue effectively, Machine Learning… More >

  • Open Access

    ARTICLE

    A Novel Green IoT-Based Pay-As-You-Go Smart Parking System

    Andrea Sant1, Lalit Garg1,*, Peter Xuereb1, Chinmay Chakraborty2

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3523-3544, 2021, DOI:10.32604/cmc.2021.015265

    Abstract The better management of resources and the potential improvement in traffic congestion via reducing the orbiting time for parking spaces is crucial in a smart city, particularly those with an uneven correlation between the increase in vehicles and infrastructure. This paper proposes and analyses a novel green IoT-based Pay-As-You-Go (PAYG) smart parking system by utilizing unused garage parking spaces. The article also presents an intelligent system that offers the most favorable prices to its users by matching private garages’ pricing portfolio with a garage’s current demand. Malta, the world’s fourth-most densely populated country, is considered as a case of a… More >

  • Open Access

    ARTICLE

    Security Threats to Business Information Systems Using NFC Read/Write Mode

    Sergio Rios-Aguilar1,2,*, Marta Beltrán2, González-Crespo Rubén3

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 2955-2969, 2021, DOI:10.32604/cmc.2021.014969

    Abstract Radio Frequency IDentification (RFID) and related technologies such as Near Field Communication (NFC) are becoming essential in industrial contexts thanks to their ability to perform contactless data exchange, either device-to-device or tag-to-device. One of the three main operation modes of NFC, called read/write mode, makes use of the latter type of interaction. It is extensively used in business information systems that make use of NFC tags to provide the end-user with augmented information in one of several available NFC data exchange formats, such as plain text, simple URLs or enriched URLs. Using a wide variety of physical form factors, NFC-compatible… More >

  • Open Access

    ARTICLE

    State-Based Offloading Model for Improving Response Rate of IoT Services

    K. Sakthidasan1, Bhekisipho Twala2, S. Yuvaraj3, K. Vijayan3,*, S. Praveenkumar3, Prashant Mani4, C. Bharatiraja3

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3721-3735, 2021, DOI:10.32604/cmc.2021.014321

    Abstract The Internet of Things (IoT) is a heterogeneous information sharing and access platform that provides services in a pervasive manner. Task and computation offloading in the IoT helps to improve the response rate and the availability of resources. Task offloading in a service-centric IoT environment mitigates the complexity in response delivery and request processing. In this paper, the state-based task offloading method (STOM) is introduced with a view to maximize the service response rate and reduce the response time of the varying request densities. The proposed method is designed using the Markov decision-making model to improve the rate of requests… More >

  • Open Access

    ARTICLE

    Quality of Service Aware Cluster Routing in Vehicular Ad Hoc Networks

    Ishtiaq Wahid1, Fasee Ullah2,*, Masood Ahmad1, Atif Khan3, M. Irfan Uddin4, Abdullah Alharbi5, Wael Alosaimi5

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3949-3965, 2021, DOI:10.32604/cmc.2021.014190

    Abstract In vehicular ad hoc networks (VANETs), the topology information (TI) is updated frequently due to vehicle mobility. These frequent changes in topology increase the topology maintenance overhead. To reduce the control message overhead, cluster-based routing schemes are proposed. In cluster-based routing schemes, the nodes are divided into different virtual groups, and each group (logical node) is considered a cluster. The topology changes are accommodated within each cluster, and broadcasting TI to the whole VANET is not required. The cluster head (CH) is responsible for managing the communication of a node with other nodes outside the cluster. However, transmitting real-time data… More >

  • Open Access

    ARTICLE

    Potassium-Induced Regulation of Cellular Antioxidant Defense and Improvement of Physiological Processes in Wheat under Water Deficit Condition

    Abdul Awal Chowdhury Masud1, Md. Fazlul Karim1, M. H. M. Borhannuddin Bhuyan2, Jubayer Al Mahmud3, Kamrun Nahar4, Masayuki Fujita5, Mirza Hasanuzzaman1,*

    Phyton-International Journal of Experimental Botany, Vol.90, No.2, pp. 353-372, 2021, DOI:10.32604/phyton.2021.013259

    Abstract Drought is the most common form of abiotic stress that reduces plant growth and productivity. It causes plant injuries through elevated production of reactive oxygen species (ROS). Potassium (K) is a vital plant nutrient that notably ameliorates the detrimental effect of drought stress in the plant. A pot experiment was conducted at the Laboratory of Plant Stress Responses, Faculty of Agriculture, Kagawa University, Japan, under controlled environment of green house to explore the role of K in mitigating drought severity in wheat (Triticum asevitum L.) seedlings. Three days after germination, seedlings were exposed to three water regimes viz., 100, 50,… More >

  • Open Access

    ARTICLE

    Evaluation of Ocimum basilicum L. with Different Concentrations of K+ as an Inhibitor of Pathogenic Bacterial Strains

    Mercedes Georgina Ramírez-Aragón1, Victoria Jared Borroel-García1, Ramón Valenzuela-Soto1, Ricardo David Valdez-Cepeda2, Francisco Javier Wong-Corral3, José Luis García-Hernández4,*

    Phyton-International Journal of Experimental Botany, Vol.90, No.2, pp. 533-541, 2021, DOI:10.32604/phyton.2021.013166

    Abstract The extraction of bioactive compounds has become one of the most interesting areas of modern chemistry. For therapeutic reasons, it´s important to obtain antimicrobial agents from natural origin. The objective of the present study was to determine the inhibitory effect of ethanolic extract of basil (Ocimum basilicum L. var. Red Rubin) subjected to different concentrations of potassium (K+) on the activity of three bacterial strains that are pathogens in humans. Susceptibility was evaluated by inhibition surface and these results were compared to two antibiotics: Gentamicin (GE) and Ciprofloxacin (CPF) for their efficacy against each bacterial strain. Analyzed variables presented significant… More >

  • Open Access

    ARTICLE

    A Novel IoT Application Recommendation System Using Metaheuristic Multi-Criteria Analysis

    Mohammed Hayder Kadhim, Farhad Mardukhi*

    Computer Systems Science and Engineering, Vol.37, No.2, pp. 149-158, 2021, DOI:10.32604/csse.2021.014608

    Abstract There are a variety of Internet of Things (IoT) applications that cover different aspects of daily life. Each of these applications has different criteria and sub-criteria, making it difficult for the user to choose. This requires an automated approach to select IoT applications by considering criteria. This paper presents a novel recommendation system for presenting applications on the IoT. First, using the analytic hierarchy process (AHP), a multi-layer architecture of the criteria and sub-criteria in IoT applications is presented. This architecture is used to evaluate and rank IoT applications. As a result, finding the weight of the criteria and sub-criteria… More >

  • Open Access

    REVIEW

    Potential roles of functional bacterial amyloid proteins, bacterial biosurfactants and other putative gut microbiota products in the etiopathogeny of Parkinson’s Disease

    EMILIA MANOLE1,2,#, LAURA DUMITRESCU2,3,#, CRISTINA NICULIȚE1,3, BOGDAN OVIDIU POPESCU1,2,3, LAURA CRISTINA CEAFALAN1,3,*

    BIOCELL, Vol.45, No.1, pp. 1-16, 2021, DOI:10.32604/biocell.2021.013452

    Abstract An increasing number of studies provide evidence for the existence of a microbiota-gut-brain axis and its potential involvement in the development of sporadic Parkinson’s disease and other neurodegenerative conditions. The neuropathologic hallmark of Parkinson’s disease is the presence of brain intraneuronal aggregates of misfolded alpha-synuclein, known as Lewy bodies. Some gut microbiota products may trigger alpha-synuclein conformational changes in the neurons of the enteric nervous system, which can then spread to the brain in a prion-like fashion through the vagus nerve. Others may interfere with neuroinflammatory pathways and susceptibility to neurodegeneration. In this review, we assess the potential role of… More >

  • Open Access

    ARTICLE

    M-IDM: A Multi-Classification Based Intrusion Detection Model in Healthcare IoT

    Jae Dong Lee1,2, Hyo Soung Cha1, Shailendra Rathore2, Jong Hyuk Park2,*

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 1537-1553, 2021, DOI:10.32604/cmc.2021.014774

    Abstract In recent years, the application of a smart city in the healthcare sector via loT systems has continued to grow exponentially and various advanced network intrusions have emerged since these loT devices are being connected. Previous studies focused on security threat detection and blocking technologies that rely on testbed data obtained from a single medical IoT device or simulation using a well-known dataset, such as the NSL-KDD dataset. However, such approaches do not reflect the features that exist in real medical scenarios, leading to failure in potential threat detection. To address this problem, we proposed a novel intrusion classification architecture… More >

Displaying 571-580 on page 58 of 680. Per Page