Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (297)
  • Open Access

    ARTICLE

    IRS Assisted UAV Communications against Proactive Eavesdropping in Mobile Edge Computing Networks

    Ying Zhang1,*, Weiming Niu2, Leibing Yan1

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 885-902, 2024, DOI:10.32604/cmes.2023.029234

    Abstract In this paper, we consider mobile edge computing (MEC) networks against proactive eavesdropping. To maximize the transmission rate, IRS assisted UAV communications are applied. We take the joint design of the trajectory of UAV, the transmitting beamforming of users, and the phase shift matrix of IRS. The original problem is strong non-convex and difficult to solve. We first propose two basic modes of the proactive eavesdropper, and obtain the closed-form solution for the boundary conditions of the two modes. Then we transform the original problem into an equivalent one and propose an alternating optimization (AO) based method to obtain a… More >

  • Open Access

    ARTICLE

    Optimizing Power Allocation for D2D Communication with URLLC under Rician Fading Channel: A Learning-to-Optimize Approach

    Owais Muhammad1, Hong Jiang1,*, Mushtaq Muhammad Umer1, Bilal Muhammad2, Naeem Muhammad Ahtsam3

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 3193-3212, 2023, DOI:10.32604/iasc.2023.041232

    Abstract To meet the high-performance requirements of fifth-generation (5G) and sixth-generation (6G) wireless networks, in particular, ultra-reliable and low-latency communication (URLLC) is considered to be one of the most important communication scenarios in a wireless network. In this paper, we consider the effects of the Rician fading channel on the performance of cooperative device-to-device (D2D) communication with URLLC. For better performance, we maximize and examine the system’s minimal rate of D2D communication. Due to the interference in D2D communication, the problem of maximizing the minimum rate becomes non-convex and difficult to solve. To solve this problem, a learning-to-optimize-based algorithm is proposed… More >

  • Open Access

    ARTICLE

    Machine Learning-Enabled Communication Approach for the Internet of Medical Things

    Rahim Khan1,3, Abdullah Ghani1, Samia Allaoua Chelloug2,*, Mohammed Amin4, Aamir Saeed5, Jason Teo1

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1569-1584, 2023, DOI:10.32604/cmc.2023.039859

    Abstract The Internet of Medical Things (IoMT) is mainly concerned with the efficient utilisation of wearable devices in the healthcare domain to manage various processes automatically, whereas machine learning approaches enable these smart systems to make informed decisions. Generally, broadcasting is used for the transmission of frames, whereas congestion, energy efficiency, and excessive load are among the common issues associated with existing approaches. In this paper, a machine learning-enabled shortest path identification scheme is presented to ensure reliable transmission of frames, especially with the minimum possible communication overheads in the IoMT network. For this purpose, the proposed scheme utilises a well-known… More >

  • Open Access

    ARTICLE

    Improving Intrusion Detection in UAV Communication Using an LSTM-SMOTE Classification Method

    Abdulrahman M. Abdulghani, Mokhles M. Abdulghani, Wilbur L. Walters, Khalid H. Abed*

    Journal of Cyber Security, Vol.4, No.4, pp. 287-298, 2022, DOI:10.32604/jcs.2023.042486

    Abstract Unmanned Aerial Vehicles (UAVs) proliferate quickly and play a significant part in crucial tasks, so it is important to protect the security and integrity of UAV communication channels. Intrusion Detection Systems (IDSs) are required to protect the UAV communication infrastructure from unauthorized access and harmful actions. In this paper, we examine a new approach for enhancing intrusion detection in UAV communication channels by utilizing the Long Short-Term Memory network (LSTM) combined with the Synthetic Minority Oversampling Technique (SMOTE) algorithm, and this integration is the binary classification method (LSTM-SMOTE). We successfully achieved 99.83% detection accuracy by using the proposed approach and… More >

  • Open Access

    ARTICLE

    Sonar Image Target Detection for Underwater Communication System Based on Deep Neural Network

    Lilan Zou1, Bo Liang1, Xu Cheng2, Shufa Li1,*, Cong Lin1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.3, pp. 2641-2659, 2023, DOI:10.32604/cmes.2023.028037

    Abstract Target signal acquisition and detection based on sonar images is a challenging task due to the complex underwater environment. In order to solve the problem that some semantic information in sonar images is lost and model detection performance is degraded due to the complex imaging environment, we proposed a more effective and robust target detection framework based on deep learning, which can make full use of the acoustic shadow information in the forward-looking sonar images to assist underwater target detection. Firstly, the weighted box fusion method is adopted to generate a fusion box by weighted fusion of prediction boxes with… More > Graphic Abstract

    Sonar Image Target Detection for Underwater Communication System Based on Deep Neural Network

  • Open Access

    ARTICLE

    RAISE: A Resilient Anonymous Information Sharing Environment

    Ning Hu1, Ling Liu1, Xin Liu3, Kaijun Wu2, Yue Zhao2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.3, pp. 2743-2759, 2023, DOI:10.32604/cmes.2023.026939

    Abstract With the widespread application of cloud computing and network virtualization technologies, more and more enterprise applications are directly deployed in the cloud. However, the traditional TCP/IP network transmission model does not fully consider the information security issues caused by the uncontrollable internet environment. Network security communication solutions represented by encrypted virtual private networks (VPN) are facing multiple security threats. In fact, during the communication process, the user application needs to protect not only the content of the communication but also the behavior of the communication, such as the communication relationship, the communication protocol, and so on. Inspired by blockchain and… More >

  • Open Access

    ARTICLE

    An Enhanced Intelligent Intrusion Detection System to Secure E-Commerce Communication Systems

    Adil Hussain1, Kashif Naseer Qureshi2,*, Khalid Javeed3, Musaed Alhussein4

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2513-2528, 2023, DOI:10.32604/csse.2023.040305

    Abstract Information and communication technologies are spreading rapidly due to their fast proliferation in many fields. The number of Internet users has led to a spike in cyber-attack incidents. E-commerce applications, such as online banking, marketing, trading, and other online businesses, play an integral role in our lives. Network Intrusion Detection System (NIDS) is essential to protect the network from unauthorized access and against other cyber-attacks. The existing NIDS systems are based on the Backward Oracle Matching (BOM) algorithm, which minimizes the false alarm rate and causes of high packet drop ratio. This paper discussed the existing NIDS systems and different… More >

  • Open Access

    ARTICLE

    Securing Healthcare Data in IoMT Network Using Enhanced Chaos Based Substitution and Diffusion

    Musheer Ahmad1, Reem Ibrahim Alkanhel2,*, Naglaa F. Soliman2, Abeer D. Algarni2, Fathi E. Abd El-Samie3, Walid El-Shafai3,4

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2361-2380, 2023, DOI:10.32604/csse.2023.038439

    Abstract Patient privacy and data protection have been crucial concerns in E-healthcare systems for many years. In modern-day applications, patient data usually holds clinical imagery, records, and other medical details. Lately, the Internet of Medical Things (IoMT), equipped with cloud computing, has come out to be a beneficial paradigm in the healthcare field. However, the openness of networks and systems leads to security threats and illegal access. Therefore, reliable, fast, and robust security methods need to be developed to ensure the safe exchange of healthcare data generated from various image sensing and other IoMT-driven devices in the IoMT network. This paper… More >

  • Open Access

    ARTICLE

    An Efficient MPPT Tracking in Solar PV System with Smart Grid Enhancement Using CMCMAC Protocol

    B. Jegajothi1,*, Sundaram Arumugam2, Neeraj Kumar Shukla3, I. Kathir4, P. Yamunaa5, Monia Digra6

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2417-2437, 2023, DOI:10.32604/csse.2023.038074

    Abstract Renewable energy sources like solar, wind, and hydro are becoming increasingly popular due to the fewer negative impacts they have on the environment. Because, Since the production of renewable energy sources is still in the process of being created, photovoltaic (PV) systems are commonly utilized for installation situations that are acceptable, clean, and simple. This study presents an adaptive artificial intelligence approach that can be used for maximum power point tracking (MPPT) in solar systems with the help of an embedded controller. The adaptive method incorporates both the Whale Optimization Algorithm (WOA) and the Artificial Neural Network (ANN). The WOA… More >

  • Open Access

    ARTICLE

    Computation of PoA for Selfish Node Detection and Resource Allocation Using Game Theory

    S. Kanmani1,*, M. Murali2

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2583-2598, 2023, DOI:10.32604/csse.2023.037265

    Abstract The introduction of new technologies has increased communication network coverage and the number of associating nodes in dynamic communication networks (DCN). As the network has the characteristics like decentralized and dynamic, few nodes in the network may not associate with other nodes. These uncooperative nodes also known as selfish nodes corrupt the performance of the cooperative nodes. Namely, the nodes cause congestion, high delay, security concerns, and resource depletion. This study presents an effective selfish node detection method to address these problems. The Price of Anarchy (PoA) and the Price of Stability (PoS) in Game Theory with the Presence of… More >

Displaying 31-40 on page 4 of 297. Per Page