Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (373)
  • Open Access

    ARTICLE

    FACT: An Air-Ground Communication Framework for Seeding Quality Control of Aircraft

    Dequan Li1,2, Jiming Li1,2, Xu Zhou1,2, JinRong Hu3, Xin Wang4, Jing Duan1,2,*

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 539-555, 2022, DOI:10.32604/csse.2022.019551 - 25 October 2021

    Abstract A new type of air-ground communication application framework named FACT (framework for air-ground communication technology with weather-modification aircraft) is presented to track and command weather-modification aircraft to perform ideal cloud seeding. FACT provides a set of solutions from three perspectives, namely, onboard, onground and air-to-ground, with the core purpose of solving the problems of the rapid exchange of information, contract analysis and identifying potential seeding areas when flight plans and meteorological conditions change. On board, the observed data are processed centrally and transmitted downward through air-to-ground communication. The real-time application and sharing of aircraft detection More >

  • Open Access

    ARTICLE

    Ultra-wideband Frequency Selective Surface for Communication Applications

    Shahid Habib1, Ghaffer Iqbal Kiani2, Muhammad Fasih Uddin Butt1,3,*, Syed Muzahir Abbas4,5, Abdulah Jeza Aljohani2, Soon Xin Ng3

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6177-6187, 2022, DOI:10.32604/cmc.2022.021644 - 11 October 2021

    Abstract A low-profile ultra-wideband (UWB) band-stop frequency selective surface (FSS) is designed for S-, C-, X- and Ku-bands communication applications. The FSS is constructed by using square and circular loop elements printed on the top and bottom sides of the RO3210 substrate. The FSS has been designed to reduce the electromagnetic interference (EMI) as well as to mitigate the harmful effects of electromagnetic radiation on the human body caused by different radio devices. The dimension and size of the UWB FSS have been reduced to 0.12 λ × 0.12 λ and 90%, respectively, as compared to More >

  • Open Access

    ARTICLE

    Artificial Intelligence Based Clustering with Routing Protocol for Internet of Vehicles

    Manar Ahmed Hamza1,*, Haya Mesfer Alshahrani2, Fahd N. Al-Wesabi3,4, Mesfer Al Duhayyim5, Anwer Mustafa Hilal1, Hany Mahgoub3

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5835-5853, 2022, DOI:10.32604/cmc.2022.021059 - 11 October 2021

    Abstract With recent advances made in Internet of Vehicles (IoV) and Cloud Computing (CC), the Intelligent Transportation Systems (ITS) find it advantageous in terms of improvement in quality and interactivity of urban transportation service, mitigation of costs incurred, reduction in resource utilization, and improvement in traffic management capabilities. Many traffic-related problems in future smart cities can be sorted out with the incorporation of IoV in transportation. IoV communication enables the collection and distribution of real-time essential data regarding road network condition. In this scenario, energy-efficient and reliable intercommunication routes are essential among vehicular nodes in sustainable… More >

  • Open Access

    ARTICLE

    Handover Mechanism Based on Underwater Hybrid Software-Defined Modem in Advanced Diver Networks

    K. M. Delphin Raj1, Sun-Ho Yum1, Jinyoung Lee2, Eunbi Ko3, Soo-Yong Shin2, Soo-Hyun Park3,*

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5721-5743, 2022, DOI:10.32604/cmc.2022.020870 - 11 October 2021

    Abstract For the past few decades, the internet of underwater things (IoUT) obtained a lot of attention in mobile aquatic applications such as oceanography, diver network monitoring, unmanned underwater exploration, underwater surveillance, location tracking system, etc. Most of the IoUT applications rely on acoustic medium. The current IoUT applications face difficulty in delivering a reliable communication system due to the various technical limitations of IoUT environment such as low data rate, attenuation, limited bandwidth, limited battery, limited memory, connectivity problem, etc. One of the significant applications of IoUT include monitoring underwater diver networks. In order to… More >

  • Open Access

    ARTICLE

    Spark Spectrum Allocation for D2D Communication in Cellular Networks

    Tanveer Ahmad1, Imran Khan2, Azeem Irshad3, Shafiq Ahmad4, Ahmed T. Soliman4, Akber Abid Gardezi5, Muhammad Shafiq6,*, Jin-Ghoo Choi6

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6381-6394, 2022, DOI:10.32604/cmc.2022.019787 - 11 October 2021

    Abstract The device-to-device (D2D) technology performs explicit communication between the terminal and the base station (BS) terminal, so there is no need to transmit data through the BS system. The establishment of a short-distance D2D communication link can greatly reduce the burden on the BS server. At present, D2D is one of the key technologies in 5G technology and has been studied in depth. D2D communication reuses the resources of cellular users to improve system key parameters like utilization and throughput. However, repeated use of the spectrum and coexistence of cellular users can cause co-channel interference. More >

  • Open Access

    ARTICLE

    Bcvop2p: Decentralized Blockchain-Based Authentication Scheme for Secure Voice Communication

    Mustafa Kara1,*, Muhammed Ali Aydın1,2, Hasan Hüseyin Balık1

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1901-1918, 2022, DOI:10.32604/iasc.2022.021309 - 09 October 2021

    Abstract Peer-to-peer VoIP applications are exposed to threats in the Internet environment as they carry out conversations over the Internet, which is an electronic communication line, and its security has always been largely a matter of concern. Authentication of the caller is the first line of defense among the security principles and is an important principle to provide security in VoIP application. Authentication methods in VoIP applications are usually based on trusted third parties or through centralized architecture. This situation creates problems in terms of single point of failure and privacy in call security over IP More >

  • Open Access

    ARTICLE

    Low Cost Autonomous Learning and Advising Smart Home Automation System

    Daniel Chioran*, Honoriu Valean

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1939-1952, 2022, DOI:10.32604/iasc.2022.020649 - 09 October 2021

    Abstract In today’s world, more than ever before, we are fascinated and drawn towards smart autonomous devices that make our lives safer and more comfortable. Devices that aid in reducing our energy consumption are also highly appreciated but often quite expensive to buy. This context is favorable for developing an autonomous smart home automation system (SHAS) with energy-saving potential and low price, making it widely accessible. This paper presents the design and prototype implementation of such a low-cost micro-controller based autonomous SHAS that learns the resident’s work schedule and integrates a wide array of sensors and… More >

  • Open Access

    ARTICLE

    Rule-Based Anomaly Detection Model with Stateful Correlation Enhancing Mobile Network Security

    Rafia Afzal, Raja Kumar Murugesan*

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1825-1841, 2022, DOI:10.32604/iasc.2022.020598 - 09 October 2021

    Abstract The global Signalling System No. 7 (SS7) network protocol standard has been developed and regulated based only on trusted partner networks. The SS7 network protocol by design neither secures the communication channel nor verifies the entire network peers. The SS7 network protocol used in telecommunications has deficiencies that include verification of actual subscribers, precise location, subscriber’s belonging to a network, absence of illegitimate message filtering mechanism, and configuration deficiencies in home routing networks. Attackers can take advantage of these deficiencies and exploit them to impose threats such as subscriber or network data disclosure, intercept mobile… More >

  • Open Access

    ARTICLE

    An Optimized Algorithm for Resource Allocation for D2D in Heterogeneous Networks

    Abdul Kadir Hamid1, Fahd N. Al-Wesabi2,3,*, Nadhem Nemri4, Ammar Zahary3, Imran Khan5

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2923-2936, 2022, DOI:10.32604/cmc.2022.020309 - 27 September 2021

    Abstract With the emergence of 5G mobile multimedia services, end users’ demand for high-speed, low-latency mobile communication network access is increasing. Among them, the device-to-device (D2D) communication is one of the considerable technology. In D2D communication, the data does not need to be relayed and forwarded by the base station, but under the control of the base station, a direct local link is allowed between two adjacent mobile devices. This flexible communication mode reduces the processing bottlenecks and coverage blind spots of the base station, and can be widely used in dense user communication scenarios such… More >

  • Open Access

    ARTICLE

    A Joint Resource Allocation Algorithm for D2D Communication

    Abdul Kadir Hamid1, Lamia Osman Widaa2, Fahd N. Al-Wesabi3,*, Imran Khan4, Anwer Mustafa Hilal5, Manar Ahmed Hamza5, Abu Sarwar Zaman5, Mohammed Rizwanullah5

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3751-3762, 2022, DOI:10.32604/cmc.2022.020136 - 27 September 2021

    Abstract The emergence of multimedia services has meant a substantial increase in the number of devices in mobile networks and driving the demand for higher data transmission rates. The result is that, cellular networks must technically evolve to support such higher rates, to be equipped with greater capacity, and to increase the spectral and energy efficiency. Compared with 4G technology, the 5G networks are being designed to transmit up to 100 times more data volume with devices whose battery life is 10 times longer. Therefore, this new generation of networks has adopted a heterogeneous and ultra-dense… More >

Displaying 251-260 on page 26 of 373. Per Page