Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (11)
  • Open Access

    ARTICLE

    Novel Fractal-Based Features for Low-Power Appliances in Non-Intrusive Load Monitoring

    Anam Mughees1,2,*, Muhammad Kamran1,3

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 507-526, 2024, DOI:10.32604/cmc.2024.051820 - 18 July 2024

    Abstract Non-intrusive load monitoring is a method that disaggregates the overall energy consumption of a building to estimate the electric power usage and operating status of each appliance individually. Prior studies have mostly concentrated on the identification of high-power appliances like HVAC systems while overlooking the existence of low-power appliances. Low-power consumer appliances have comparable power consumption patterns, which can complicate the detection task and can be mistaken as noise. This research tackles the problem of classification of low-power appliances and uses turn-on current transients to extract novel features and develop unique appliance signatures. A hybrid… More >

  • Open Access

    ARTICLE

    Interval Type-2 Fuzzy Model for Intelligent Fire Intensity Detection Algorithm with Decision Making in Low-Power Devices

    Emmanuel Lule1,2,*, Chomora Mikeka3, Alexander Ngenzi4, Didacienne Mukanyiligira5

    Intelligent Automation & Soft Computing, Vol.38, No.1, pp. 57-81, 2023, DOI:10.32604/iasc.2023.037988 - 26 January 2024

    Abstract Local markets in East Africa have been destroyed by raging fires, leading to the loss of life and property in the nearby communities. Electrical circuits, arson, and neglected charcoal stoves are the major causes of these fires. Previous methods, i.e., satellites, are expensive to maintain and cause unnecessary delays. Also, unit-smoke detectors are highly prone to false alerts. In this paper, an Interval Type-2 TSK fuzzy model for an intelligent lightweight fire intensity detection algorithm with decision-making in low-power devices is proposed using a sparse inference rules approach. A free open–source MATLAB/Simulink fuzzy toolbox integrated… More >

  • Open Access

    ARTICLE

    Unweighted Voting Method to Detect Sinkhole Attack in RPL-Based Internet of Things Networks

    Shadi Al-Sarawi1, Mohammed Anbar1,*, Basim Ahmad Alabsi2, Mohammad Adnan Aladaileh3, Shaza Dawood Ahmed Rihan2

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 491-515, 2023, DOI:10.32604/cmc.2023.041108 - 31 October 2023

    Abstract The Internet of Things (IoT) consists of interconnected smart devices communicating and collecting data. The Routing Protocol for Low-Power and Lossy Networks (RPL) is the standard protocol for Internet Protocol Version 6 (IPv6) in the IoT. However, RPL is vulnerable to various attacks, including the sinkhole attack, which disrupts the network by manipulating routing information. This paper proposes the Unweighted Voting Method (UVM) for sinkhole node identification, utilizing three key behavioral indicators: DODAG Information Object (DIO) Transaction Frequency, Rank Harmony, and Power Consumption. These indicators have been carefully selected based on their contribution to sinkhole… More >

  • Open Access

    ARTICLE

    Wake-Up Security: Effective Security Improvement Mechanism for Low Power Internet of Things

    Sun-Woo Yun1, Na-Eun Park1, Il-Gu Lee1,2,*

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2897-2917, 2023, DOI:10.32604/iasc.2023.039940 - 11 September 2023

    Abstract As time and space constraints decrease due to the development of wireless communication network technology, the scale and scope of cyberattacks targeting the Internet of Things (IoT) are increasing. However, it is difficult to apply high-performance security modules to the IoT owing to the limited battery, memory capacity, and data transmission performance depending on the size of the device. Conventional research has mainly reduced power consumption by lightening encryption algorithms. However, it is difficult to defend large-scale information systems and networks against advanced and intelligent attacks because of the problem of deteriorating security performance. In… More >

  • Open Access

    ARTICLE

    A Low-Power 12-Bit SAR ADC for Analog Convolutional Kernel of Mixed-Signal CNN Accelerator

    Jungyeon Lee1, Malik Summair Asghar1,2, HyungWon Kim1,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 4357-4375, 2023, DOI:10.32604/cmc.2023.031372 - 31 March 2023

    Abstract As deep learning techniques such as Convolutional Neural Networks (CNNs) are widely adopted, the complexity of CNNs is rapidly increasing due to the growing demand for CNN accelerator system-on-chip (SoC). Although conventional CNN accelerators can reduce the computational time of learning and inference tasks, they tend to occupy large chip areas due to many multiply-and-accumulate (MAC) operators when implemented in complex digital circuits, incurring excessive power consumption. To overcome these drawbacks, this work implements an analog convolutional filter consisting of an analog multiply-and-accumulate arithmetic circuit along with an analog-to-digital converter (ADC). This paper introduces the… More >

  • Open Access

    ARTICLE

    High-Bandwidth, Low-Power CMOS Transistor Based CAB for Field Programmable Analog Array

    Ameen Bin Obadi1, Alaa El-Din Hussein2, Samir Salem Al-Bawri3,4,*, Kabir Hossain5, Abdullah Abdulhameed4, Muzammil Jusoh1,6,7, Thennarasan Sabapathy1,6, Ahmed Jamal Abdullah Al-Gburi8, Mahmoud A. Albreem9

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5885-5900, 2023, DOI:10.32604/cmc.2023.033789 - 28 December 2022

    Abstract This article presents an integrated current mode configurable analog block (CAB) system for field-programmable analog array (FPAA). The proposed architecture is based on the complementary metal-oxide semiconductor (CMOS) transistor level design where MOSFET transistors operating in the saturation region are adopted. The proposed CAB architecture is designed to implement six of the widely used current mode operations in analog processing systems: addition, subtraction, integration, multiplication, division, and pass operation. The functionality of the proposed CAB is demonstrated through these six operations, where each operation is chosen based on the user’s selection in the CAB interface… More >

  • Open Access

    ARTICLE

    BE-RPL: Balanced-load and Energy-efficient RPL

    S. Jagir Hussain*, M. Roopa

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 785-801, 2023, DOI:10.32604/csse.2023.030393 - 16 August 2022

    Abstract Internet of Things (IoT) empowers imaginative applications and permits new services when mobile nodes are included. For IoT-enabled low-power and lossy networks (LLN), the Routing Protocol for Low-power and Lossy Networks (RPL) has become an established standard routing protocol. Mobility under standard RPL remains a difficult issue as it causes continuous path disturbance, energy loss, and increases the end-to-end delay in the network. In this unique circumstance, a Balanced-load and Energy-efficient RPL (BE-RPL) is proposed. It is a routing technique that is both energy-efficient and mobility-aware. It responds quicker to link breakage through received signal More >

  • Open Access

    ARTICLE

    A Time-Domain Comparator Based Skipping-Window SAR ADC

    Liangbo Xie1, Yan Ren1, Mu Zhou1, Xiaolong Yang1,*, Zhengwen Huang2

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1597-1609, 2021, DOI:10.32604/cmc.2021.018502 - 21 July 2021

    Abstract This paper presents an energy efficient successive-approximation register (SAR) analog-to-digital converter (ADC) for low-power applications. To improve the overall energy-efficiency, a skipping-window technique is used to bypass corresponding conversion steps when the input falls in a window indicated by a time-domain comparator, which can provide not only the polarity of the input, but also the amount information of the input. The time-domain comparator, which is based on the edge pursing principle, consists of delay cells, two NAND gates, two D-flip-flop register-based phase detectors and a counter. The digital characteristic of the comparator makes the design… More >

  • Open Access

    ARTICLE

    LOA-RPL: Novel Energy-Efficient Routing Protocol for the Internet of Things Using Lion Optimization Algorithm to Maximize Network Lifetime

    Sankar Sennan1, Somula Ramasubbareddy2, Anand Nayyar3,4, Yunyoung Nam5,*, Mohamed Abouhawwash6,7

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 351-371, 2021, DOI:10.32604/cmc.2021.017360 - 04 June 2021

    Abstract Energy conservation is a significant task in the Internet of Things (IoT) because IoT involves highly resource-constrained devices. Clustering is an effective technique for saving energy by reducing duplicate data. In a clustering protocol, the selection of a cluster head (CH) plays a key role in prolonging the lifetime of a network. However, most cluster-based protocols, including routing protocols for low-power and lossy networks (RPLs), have used fuzzy logic and probabilistic approaches to select the CH node. Consequently, early battery depletion is produced near the sink. To overcome this issue, a lion optimization algorithm (LOA)… More >

  • Open Access

    ARTICLE

    Collision Observation-Based Optimization of Low-Power and Lossy IoT Network Using Reinforcement Learning

    Arslan Musaddiq1, Rashid Ali2, Jin-Ghoo Choi1, Byung-Seo Kim3,*, Sung-Won Kim1

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 799-814, 2021, DOI:10.32604/cmc.2021.014751 - 12 January 2021

    Abstract The Internet of Things (IoT) has numerous applications in every domain, e.g., smart cities to provide intelligent services to sustainable cities. The next-generation of IoT networks is expected to be densely deployed in a resource-constrained and lossy environment. The densely deployed nodes producing radically heterogeneous traffic pattern causes congestion and collision in the network. At the medium access control (MAC) layer, mitigating channel collision is still one of the main challenges of future IoT networks. Similarly, the standardized network layer uses a ranking mechanism based on hop-counts and expected transmission counts (ETX), which often does… More >

Displaying 1-10 on page 1 of 11. Per Page