Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (298)
  • Open Access

    REVIEW

    Low Altitude Satellite Constellation for Futuristic Aerial-Ground Communications

    Saifur Rahman Sabuj1, Mohammad Saadman Alam2, Majumder Haider2, Md Akbar Hossain3, Al-Sakib Khan Pathan4,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.2, pp. 1053-1089, 2023, DOI:10.32604/cmes.2023.024078

    Abstract This paper discusses the significance and prospects of low altitude small satellite aerial vehicles to ensure smooth aerial-ground communications for next-generation broadband networks. To achieve the generic goals of fifthgeneration and beyond wireless networks, the existing aerial network architecture needs to be revisited. The detailed architecture of low altitude aerial networks and the challenges in resource management have been illustrated in this paper. Moreover, we have studied the coordination between promising communication technologies and low altitude aerial networks to provide robust network coverage. We talk about the techniques that can ensure userfriendly control and monitoring of the low altitude aerial… More > Graphic Abstract

    Low Altitude Satellite Constellation for Futuristic Aerial-Ground Communications

  • Open Access

    ARTICLE

    An Early Warning Model of Telecommunication Network Fraud Based on User Portrait

    Wen Deng1, Guangjun Liang1,2,3,*, Chenfei Yu1, Kefan Yao1, Chengrui Wang1, Xuan Zhang1

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1561-1576, 2023, DOI:10.32604/cmc.2023.035016

    Abstract With the frequent occurrence of telecommunications and network fraud crimes in recent years, new frauds have emerged one after another which has caused huge losses to the people. However, due to the lack of an effective preventive mechanism, the police are often in a passive position. Using technologies such as web crawlers, feature engineering, deep learning, and artificial intelligence, this paper proposes a user portrait fraud warning scheme based on Weibo public data. First, we perform preliminary screening and cleaning based on the keyword “defrauded” to obtain valid fraudulent user Identity Documents (IDs). The basic information and account information of… More >

  • Open Access

    ARTICLE

    Device Discovery in D2D Communication: Scenarios and Challenges

    Adeel Iqbal1, Ali Nauman2, Riaz Hussain1, Irfan Latif Khan1, Ali Khaqan1, Sana Shuja1, Sung Won Kim2,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1735-1750, 2023, DOI:10.32604/cmc.2023.034468

    Abstract Device to Device (D2D) communication is expected to be an essential part of 5G cellular networks. D2D communication enables close-proximity devices to establish a direct communication session. D2D communication offers many advantages, such as reduced latency, high data rates, range extension, and cellular offloading. The first step to establishing a D2D session is device discovery; an efficient device discovery will lead to efficient D2D communication. D2D device further needs to manage its mode of communication, perform resource allocation, manage its interference and most importantly control its power to improve the battery life of the device. This work has developed six… More >

  • Open Access

    ARTICLE

    An Optimal Algorithm for Resource Allocation in D2D Communication

    Shahad Alyousif1,2, Mohammed Dauwed3,*, Rafal Nader4, Mohammed Hasan Ali5, Mustafa Musa Jabar6,7, Ahmed Alkhayyat8

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 531-546, 2023, DOI:10.32604/cmc.2023.034329

    Abstract The number of mobile devices accessing wireless networks is skyrocketing due to the rapid advancement of sensors and wireless communication technology. In the upcoming years, it is anticipated that mobile data traffic would rise even more. The development of a new cellular network paradigm is being driven by the Internet of Things, smart homes, and more sophisticated applications with greater data rates and latency requirements. Resources are being used up quickly due to the steady growth of smartphone devices and multimedia apps. Computation offloading to either several distant clouds or close mobile devices has consistently improved the performance of mobile… More >

  • Open Access

    ARTICLE

    A 37 GHz Millimeter-Wave Antenna Array for 5G Communication Terminals

    Jalal Khan1, Sadiq Ullah1,*, Usman Ali1, Ladislau Matekovits2,3,4, Farooq Ahmad Tahir5, Muhammad Inam Abbasi6

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1317-1330, 2023, DOI:10.32604/cmc.2023.029879

    Abstract This work presents, design and specific absorption rate (SAR) analysis of a 37 GHz antenna, for 5th Generation (5G) applications. The proposed antenna comprises of 4-elements of rectangular patch and an even distribution. The radiating element is composed of copper material supported by Rogers RT5880 substrate of thickness, 0.254 mm, dielectric constant (εr), 2.2, and loss tangent, 0.0009. The 4-elements array antenna is compact in size with a dimension of 8 mm × 20 mm in length and width. The radiating patch is excited with a 50 ohms connector i.e., K-type. The antenna resonates in the frequency band of 37 GHz, that covers the 5G applications. The antenna… More >

  • Open Access

    ARTICLE

    A Derivative Matrix-Based Covert Communication Method in Blockchain

    Xiang Zhang1, Xiaona Zhang2,4,*, Xiaorui Zhang3,5,6, Wei Sun6,7, Ruohan Meng8, Xingming Sun1

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 225-239, 2023, DOI:10.32604/csse.2023.034915

    Abstract The data in the blockchain cannot be tampered with and the users are anonymous, which enables the blockchain to be a natural carrier for covert communication. However, the existing methods of covert communication in blockchain suffer from the predefined channel structure, the capacity of a single transaction is not high, and the fixed transaction behaviors will lower the concealment of the communication channel. Therefore, this paper proposes a derivation matrix-based covert communication method in blockchain. It uses dual-key to derive two types of blockchain addresses and then constructs an address matrix by dividing addresses into multiple layers to make full… More >

  • Open Access

    ARTICLE

    Task Offloading Based on Vehicular Edge Computing for Autonomous Platooning

    Sanghyuck Nam1, Suhwan Kwak1, Jaehwan Lee2, Sangoh Park1,*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 659-670, 2023, DOI:10.32604/csse.2023.034994

    Abstract Autonomous platooning technology is regarded as one of the promising technologies for the future and the research is conducted actively. The autonomous platooning task generally requires highly complex computations so it is difficult to process only with the vehicle’s processing units. To solve this problem, there are many studies on task offloading technique which transfers complex tasks to their neighboring vehicles or computation nodes. However, the existing task offloading techniques which mainly use learning-based algorithms are difficult to respond to the real-time changing road environment due to their complexity. They are also challenging to process computation tasks within 100 ms which… More >

  • Open Access

    ARTICLE

    Improving QoS Using Mobility-Based Optimized Multipath Routing Protocol in MANET

    S. J. Sangeetha1,*, T. Rajendran2

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1169-1181, 2023, DOI:10.32604/csse.2023.033392

    Abstract Mobile Ad-hoc Networks (MANETs) connect numerous nodes to communicate data from the sender node to the target node. Due to the lack of an infrastructure network, mobile nodes communicate through wireless without an access point. MANET does not have a centralized controller and has a dynamic network topology, which increases link failure and energy consumption resulting in excessive path delay, loss of Quality of service (QoS), and reduced throughput during data communication. Congestion is a significant problem when the QoS of the link carrying the data is degraded. Routing is one of the vital challenges of MANET due to the… More >

  • Open Access

    ARTICLE

    Development of Pandemic Monitoring System Based on Constellation of Nanosatellites

    Omar Ben Bahri*, Abdullah Alhumaidi Alotaibi

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1249-1263, 2023, DOI:10.32604/csse.2023.032677

    Abstract Covid-19 is a global crisis and the greatest challenge we have faced. It affects people in different ways. Most infected people develop a mild to moderate form of the disease and recover without hospitalization. This presents a problem in spreading the pandemic with unintentionally manner. Thus, this paper provides a new technique for COVID-19 monitoring remotely and in wide range. The system is based on satellite technology that provides a pivotal solution for wireless monitoring. This mission requires a data collection technique which can be based on drones’ technology. Therefore, the main objective of our proposal is to develop a… More >

  • Open Access

    ARTICLE

    Fuzzy Logic Based Handover Authentication in 5g Telecommunication Heterogeneous Networks

    J. Divakaran1,*, Arvind Chakrapani2, K. Srihari3

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1141-1152, 2023, DOI:10.32604/csse.2023.028050

    Abstract Under various deployment circumstances, fifth-generation (5G) telecommunications delivers improved network compound management with fast communication channels. Due to the introduction of the Internet of Things (IoT) in data management, the majority of the ultra-dense network models in 5G networks frequently have decreased spectral efficiency, weak handover management, and vulnerabilities. The majority of traditional handover authentication models are seriously threatened, making them vulnerable to a variety of security attacks. The authentication of networked devices is the most important issue. Therefore, a model that incorporates the handover mechanism and authentication model must be created. This article uses a fuzzy logic model to… More >

Displaying 61-70 on page 7 of 298. Per Page