Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (8)
  • Open Access

    ARTICLE

    DAUNet: Unsupervised Neural Network Based on Dual Attention for Clock Synchronization in Multi-Agent Wireless Ad Hoc Networks

    Haihao He1,2, Xianzhou Dong1,*, Shuangshuang Wang1, Chengzhang Zhu1, Xiaotong Zhao1,2

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-23, 2026, DOI:10.32604/cmc.2025.069513 - 10 November 2025

    Abstract Clock synchronization has important applications in multi-agent collaboration (such as drone light shows, intelligent transportation systems, and game AI), group decision-making, and emergency rescue operations. Synchronization method based on pulse-coupled oscillators (PCOs) provides an effective solution for clock synchronization in wireless networks. However, the existing clock synchronization algorithms in multi-agent ad hoc networks are difficult to meet the requirements of high precision and high stability of synchronization clock in group cooperation. Hence, this paper constructs a network model, named DAUNet (unsupervised neural network based on dual attention), to enhance clock synchronization accuracy in multi-agent wireless ad hocMore >

  • Open Access

    REVIEW

    Machine Learning-Based Routing Protocol in Flying Ad Hoc Networks: A Review

    Priyanka1, Manjit Kaur1, Deepak Prashar1, Leo Mrsic2, Arfat Ahmad Khan3,*

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 1615-1643, 2025, DOI:10.32604/cmc.2025.059043 - 17 February 2025

    Abstract “Flying Ad Hoc Networks (FANETs)”, which use “Unmanned Aerial Vehicles (UAVs)”, are developing as a critical mechanism for numerous applications, such as military operations and civilian services. The dynamic nature of FANETs, with high mobility, quick node migration, and frequent topology changes, presents substantial hurdles for routing protocol development. Over the preceding few years, researchers have found that machine learning gives productive solutions in routing while preserving the nature of FANET, which is topology change and high mobility. This paper reviews current research on routing protocols and Machine Learning (ML) approaches applied to FANETs, emphasizing developments… More >

  • Open Access

    ARTICLE

    Mobility Aware Zone-Based Routing in Vehicle Ad hoc Networks Using Hybrid Metaheuristic Algorithm

    C. Nandagopal1,*, P. Siva Kumar2, R. Rajalakshmi3, S. Anandamurugan4

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 113-126, 2023, DOI:10.32604/iasc.2023.031103 - 29 September 2022

    Abstract Vehicle Ad hoc Networks (VANETs) have high mobility and a randomized connection structure, resulting in extremely dynamic behavior. Several challenges, such as frequent connection failures, sustainability, multi-hop data transfer, and data loss, affect the effectiveness of Transmission Control Protocols (TCP) on such wireless ad hoc networks. To avoid the problem, in this paper, mobility-aware zone-based routing in VANET is proposed. To achieve this concept, in this paper hybrid optimization algorithm is presented. The hybrid algorithm is a combination of Ant colony optimization (ACO) and artificial bee colony optimization (ABC). The proposed hybrid algorithm is designed for… More >

  • Open Access

    ARTICLE

    Secure and Energy Concise Route Revamp Technique in Wireless Sensor Networks

    S. M. Udhaya Sankar1,*, Mary Subaja Christo2, P. S. Uma Priyadarsini3

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2337-2351, 2023, DOI:10.32604/iasc.2023.030278 - 19 July 2022

    Abstract Energy conservation has become a significant consideration in wireless sensor networks (WSN). In the sensor network, the sensor nodes have internal batteries, and as a result, they expire after a certain period. As a result, expanding the life duration of sensing devices by improving data depletion in an effective and sustainable energy-efficient way remains a challenge. Also, the clustering strategy employs to enhance or extend the life cycle of WSNs. We identify the supervisory head node (SH) or cluster head (CH) in every grouping considered the feasible strategy for power-saving route discovery in the clustering… More >

  • Open Access

    ARTICLE

    Cross Layer QoS Aware Scheduling based on Loss-Based Proportional Fairness with Multihop CRN

    K. Saravanan1,*, G. M. Tamilselvan2, A. Rajendran3

    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1063-1077, 2022, DOI:10.32604/csse.2022.020789 - 08 February 2022

    Abstract As huge users are involved, there is a difficulty in spectrum allocation and scheduling in Cognitive Radio Networks (CRNs). Collision increases when there is no allocation of spectrum and these results in huge drop rate and network performance degradation. To solve these problems and allocate appropriate spectrum, a novel method is introduced termed as Quality of Service (QoS) Improvement Proper Scheduling (QIPS). The major contribution of the work is to design a new cross layer QoS Aware Scheduling based on Loss-based Proportional Fairness with Multihop (QoSAS-LBPFM). In Medium Access Control (MAC) multi-channel network environment mobile More >

  • Open Access

    ARTICLE

    Mathematical Model Validation of Search Protocols in MP2P Networks

    Ajay Arunachalam1,*, Vinayakumar Ravi2, Moez Krichen3, Roobaea Alroobaea4, Saeed Rubaiee5

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1807-1829, 2021, DOI:10.32604/cmc.2021.016692 - 13 April 2021

    Abstract Broadcasting is a basic technique in Mobile ad-hoc network (MANET), and it refers to sending a packet from one node to every other node within the transmission range. Flooding is a type of broadcast where the received packet is retransmitted once by every node. The naive flooding technique, floods the network with query messages, while the random walk technique operates by contacting the subsets of every node’s neighbors at each step, thereby restricting the search space. One of the key challenges in an ad-hoc network is the resource or content discovery problem which is about… More >

  • Open Access

    ARTICLE

    Cooperative Channel Assignment for VANETs Based on Dual Reinforcement Learning

    Xuting Duan1,2, Yuanhao Zhao1,2, Kunxian Zheng1,2,*, Daxin Tian1,2, Jianshan Zhou1,2,3, Jian Gao4

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 2127-2140, 2021, DOI:10.32604/cmc.2020.014484 - 26 November 2020

    Abstract Dynamic channel assignment (DCA) is significant for extending vehicular ad hoc network (VANET) capacity and mitigating congestion. However, the un-known global state information and the lack of centralized control make channel assignment performances a challenging task in a distributed vehicular direct communication scenario. In our preliminary field test for communication under V2X scenario, we find that the existing DCA technology cannot fully meet the communication performance requirements of VANET. In order to improve the communication performance, we firstly demonstrate the feasibility and potential of reinforcement learning (RL) method in joint channel selection decision and access fallback More >

  • Open Access

    ARTICLE

    Packet Drop Battling Mechanism for Energy Aware Detection in Wireless Networks

    Ahmad F. Subahi1,*, Youseef Alotaibi2, Osamah Ibrahim Khalaf3, F. Ajesh4

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 2077-2086, 2021, DOI:10.32604/cmc.2020.014094 - 26 November 2020

    Abstract Network security and energy consumption are deemed to be two important components of wireless and mobile ad hoc networks (WMANets). There are various routing attacks which harm Ad Hoc networks. This is because of the unsecure wireless communication, resource constrained capabilities and dynamic topology. In order to cope with these issues, Ad Hoc On-Demand Distance Vector (AODV) routing protocol can be used to remain the normal networks functionality and to adjust data transmission by defending the networks against black hole attacks. The proposed system, in this work, identifies the optimal route from sender to collector, prioritizing the number… More >

Displaying 1-10 on page 1 of 8. Per Page