Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (24)
  • Open Access

    ARTICLE

    Artificial Intelligence-Enabled Cooperative Cluster-Based Data Collection for Unmanned Aerial Vehicles

    R. Rajender1, C. S. S. Anupama2, G. Jose Moses3, E. Laxmi Lydia4, Seifedine Kadry5, Sangsoon Lim6,*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3351-3365, 2022, DOI:10.32604/cmc.2022.030229

    Abstract In recent times, sixth generation (6G) communication technologies have become a hot research topic because of maximum throughput and low delay services for mobile users. It encompasses several heterogeneous resource and communication standard in ensuring incessant availability of service. At the same time, the development of 6G enables the Unmanned Aerial Vehicles (UAVs) in offering cost and time-efficient solution to several applications like healthcare, surveillance, disaster management, etc. In UAV networks, energy efficiency and data collection are considered the major process for high quality network communication. But these procedures are found to be challenging because of maximum mobility, unstable links,… More >

  • Open Access

    ARTICLE

    Improved Multi-party Quantum Key Agreement with Four-qubit Cluster States

    Hussein Abulkasim1,*, Eatedal Alabdulkreem2, Safwat Hamad3

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 225-232, 2022, DOI:10.32604/cmc.2022.025727

    Abstract Quantum key agreement is a promising key establishing protocol that can play a significant role in securing 5G/6G communication networks. Recently, Liu et al. (Quantum Information Processing 18(8):1-10, 2019) proposed a multi-party quantum key agreement protocol based on four-qubit cluster states was proposed. The aim of their protocol is to agree on a shared secret key among multiple remote participants. Liu et al. employed four-qubit cluster states to be the quantum resources and the X operation to securely share a secret key. In addition, Liu et al.'s protocol guarantees that each participant makes an equal contribution to the final key.… More >

  • Open Access

    ARTICLE

    Intelligent Deep Learning Model for Privacy Preserving IIoT on 6G Environment

    Anwer Mustafa Hilal1,*, Jaber S. Alzahrani2, Ibrahim Abunadi3, Nadhem Nemri4, Fahd N. Al-Wesabi5,6, Abdelwahed Motwakel1, Ishfaq Yaseen1, Abu Sarwar Zamani1

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 333-348, 2022, DOI:10.32604/cmc.2022.024794

    Abstract In recent times, Industrial Internet of Things (IIoT) experiences a high risk of cyber attacks which needs to be resolved. Blockchain technology can be incorporated into IIoT system to help the entrepreneurs realize Industry 4.0 by overcoming such cyber attacks. Although blockchain-based IIoT network renders a significant support and meet the service requirements of next generation network, the performance arrived at, in existing studies still needs improvement. In this scenario, the current research paper develops a new Privacy-Preserving Blockchain with Deep Learning model for Industrial IoT (PPBDL-IIoT) on 6G environment. The proposed PPBDL-IIoT technique aims at identifying the existence of… More >

  • Open Access

    ARTICLE

    Non-Cooperative Learning Based Routing for 6G-IoT Cognitive Radio Network

    Tauqeer Safdar Malik1,*, Kaleem Razzaq Malik1, Muhammad Sanaullah2, Mohd Hilmi Hasan3, Norshakirah Aziz3

    Intelligent Automation & Soft Computing, Vol.33, No.2, pp. 809-824, 2022, DOI:10.32604/iasc.2022.021128

    Abstract Cognitive Radio Network (CRN) has turn up to solve the issue of spectrum congestion occurred due to the wide spread usage of wireless applications for 6G based Internet of Things (IoT) network. The Secondary Users (SUs) are allowed to access dynamically the frequency channels owned by the Primary Users (PUs). In this paper, we focus the matter of contention of routing in multi hops setup by the SUs for a known destination in the presence of PUs. The traffic model for routing is generated on the basis of Poison Process of Markov Model. Every SU requires to reduce the end-to-end… More >

  • Open Access

    ARTICLE

    Metaheuristic Based Data Gathering Scheme for Clustered UAVs in 6G Communication Network

    Ahmed S. Almasoud1, Siwar Ben Haj Hassine2, Nadhem NEMRI2, Fahd N. Al-Wesabi2,3, Manar Ahmed Hamza4,*, Anwer Mustafa Hilal4, Abdelwahed Motwakel4, Mesfer Al Duhayyim5

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5311-5325, 2022, DOI:10.32604/cmc.2022.024500

    Abstract The sixth-generation (6G) wireless communication networks are anticipated in integrating aerial, terrestrial, and maritime communication into a robust system to accomplish trustworthy, quick, and low latency needs. It enables to achieve maximum throughput and delay for several applications. Besides, the evolution of 6G leads to the design of unmanned aerial vehicles (UAVs) in providing inexpensive and effective solutions in various application areas such as healthcare, environment monitoring, and so on. In the UAV network, effective data collection with restricted energy capacity poses a major issue to achieving high quality network communication. It can be addressed by the use of clustering… More >

  • Open Access

    REVIEW

    Milestones of Wireless Communication Networks and Technology Prospect of Next Generation (6G)

    Mohammed H. Alsharif1, Md. Sanwar Hossain2, Abu Jahid3, Muhammad Asghar Khan4, Bong Jun Choi5,*, Samih M. Mostafa6,7

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4803-4818, 2022, DOI:10.32604/cmc.2022.023500

    Abstract Since around 1980, a new generation of wireless technology has arisen approximately every 10 years. First-generation (1G) and second-generation (2G) began with voice and eventually introduced more and more data in third-generation (3G) and became highly popular in the fourth-generation (4G). To increase the data rate along with low latency and mass connectivity the fifth-generation (5G) networks are being installed from 2020. However, the 5G technology will not be able to fulfill the data demand at the end of this decade. Therefore, it is expected that 6G communication networks will rise, providing better services through the implementation of new enabling… More >

  • Open Access

    ARTICLE

    Blockchain-Based Decentralized Reputation Management System for Internet of Everything in 6G-Enabled Cybertwin Architecture

    Meimin Wang, Zhili Zhou*, Chun Ding

    Journal of New Media, Vol.3, No.4, pp. 137-150, 2021, DOI:10.32604/jnm.2021.024543

    Abstract Internet of Everything (IoE) has emerged as a promising paradigm for the purpose of connecting and exchanging data among physical objects and humans over the Internet, and it can be widely applied in the fields of industry, transportation, commerce, and education. Recently, the emergence of 6G-enabled cybertwin network architecture provides the technical and theoretical foundation for the realization of IoE paradigm. However, the IoE has three open issues in the 6G-enabled cybertwin architecture, i.e., data authenticity, data storage and node reliability. To address these issues, we propose a blockchain-based decentralized reputation management system (BC-DRMS) for IoE in 6G-enabled Cybertwin architecture.… More >

  • Open Access

    ARTICLE

    Energy Aware Data Collection with Route Planning for 6G Enabled UAV Communication

    Mesfer Al Duhayyim1, Marwa Obayya2, Fahd N. Al-Wesabi3,4, Anwer Mustafa Hilal5,*, Mohammed Rizwanullah5, Majdy M. Eltahir6

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 825-842, 2022, DOI:10.32604/cmc.2022.021490

    Abstract With technological advancements in 6G and Internet of Things (IoT), the incorporation of Unmanned Aerial Vehicles (UAVs) and cellular networks has become a hot research topic. At present, the proficient evolution of 6G networks allows the UAVs to offer cost-effective and timely solutions for real-time applications such as medicine, tracking, surveillance, etc. Energy efficiency, data collection, and route planning are crucial processes to improve the network communication. These processes are highly difficult owing to high mobility, presence of non-stationary links, dynamic topology, and energy-restricted UAVs. With this motivation, the current research paper presents a novel Energy Aware Data Collection with… More >

  • Open Access

    ARTICLE

    Metaheuristic Resource Allocation Strategy for Cluster Based 6G Industrial Applications

    Anwer Mustafa Hilal1,*, Lamia Osman Widaa2, Fahd N. Al-Wesabi3, Mohammad Medani3, Manar Ahmed Hamza1, Mesfer Al Duhayyim4

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 667-681, 2022, DOI:10.32604/cmc.2022.021338

    Abstract The emergence of Beyond 5G (B5G) and 6G networks translated personal and industrial operations highly effective, reliable, and gainful by speeding up the growth of next generation Internet of Things (IoT). Industrial equipment in 6G encompasses a huge number of wireless sensors, responsible for collecting massive quantities of data. At the same time, 6G network can take real-world intelligent decisions and implement automated equipment operations. But the inclusion of different technologies into the system increased its energy consumption for which appropriate measures need to be taken. This has become mandatory for optimal resource allocation in 6G-enabled industrial applications. In this… More >

  • Open Access

    ARTICLE

    An Efficient Scheme for Interference Mitigation in 6G-IoT Wireless Networks

    Fahd N. Al-Wesabi1,*, Imran Khan2, Nadhem Nemri3, Mohammed A. Al-Hagery4, Huda G. Iskander5, Quang Ngoc Nguyen6, Babar Shah7, Ki-Il Kim8

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3889-3902, 2021, DOI:10.32604/cmc.2021.016218

    Abstract The Internet of Things (IoT) is the fourth technological revolution in the global information industry after computers, the Internet, and mobile communication networks. It combines radio-frequency identification devices, infrared sensors, global positioning systems, and various other technologies. Information sensing equipment is connected via the Internet, thus forming a vast network. When these physical devices are connected to the Internet, the user terminal can be extended and expanded to exchange information, communicate with anything, and carry out identification, positioning, tracking, monitoring, and triggering of corresponding events on each device in the network. In real life, the IoT has a wide range… More >

Displaying 11-20 on page 2 of 24. Per Page