Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (17)
  • Open Access

    ARTICLE

    Priority Based Energy Efficient MAC Protocol by Varying Data Rate for Wireless Body Area Network

    R. Sangeetha, Usha Devi Gandhi*

    Computer Systems Science and Engineering, Vol.48, No.2, pp. 395-411, 2024, DOI:10.32604/csse.2023.041217

    Abstract Wireless Body Area Network (WBAN) is a cutting-edge technology that is being used in healthcare applications to monitor critical events in the human body. WBAN is a collection of in-body and on-body sensors that monitor human physical parameters such as temperature, blood pressure, pulse rate, oxygen level, body motion, and so on. They sense the data and communicate it to the Body Area Network (BAN) Coordinator. The main challenge for the WBAN is energy consumption. These issues can be addressed by implementing an effective Medium Access Control (MAC) protocol that reduces energy consumption and increases network lifetime. The purpose of… More >

  • Open Access

    REVIEW

    International Standardization of Blockchain and Distributed Ledger Technology: Overlaps, Gaps and Challenges

    Xiangjuan Jia1, Jing Xu1, Mengwei Han1, Qing Zhang1, Lu Zhang1, Xiaofeng Chen1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.2, pp. 1491-1523, 2023, DOI:10.32604/cmes.2023.026357

    Abstract As one of the most concerned digital technologies in recent years, blockchain and distributed ledger technology are an important driving force for a new round of technological development. It is currently in the process of accelerating its evolution and maturity, and has gradually integrated with other digital technologies. It has been applied in many industries, providing decentralized solutions for various industries, realizing innovative storage models, and building a new trust system. As blockchain technology is officially incorporated into China’s new information infrastructure category, the application fields of blockchain have expanded rapidly, gradually extending from the financial field and government affairs… More >

  • Open Access

    ARTICLE

    Accurate Phase Detection for ZigBee Using Artificial Neural Network

    Ali Alqahtani1, Abdulaziz A. Alsulami2,*, Saeed Alahmari3, Mesfer Alrizq4

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2505-2518, 2023, DOI:10.32604/iasc.2023.033243

    Abstract The IEEE802.15.4 standard has been widely used in modern industry due to its several benefits for stability, scalability, and enhancement of wireless mesh networking. This standard uses a physical layer of binary phase-shift keying (BPSK) modulation and can be operated with two frequency bands, 868 and 915 MHz. The frequency noise could interfere with the BPSK signal, which causes distortion to the signal before its arrival at receiver. Therefore, filtering the BPSK signal from noise is essential to ensure carrying the signal from the sender to the receiver with less error. Therefore, removing signal noise in the BPSK signal is… More >

  • Open Access

    ARTICLE

    Reinforcement Learning-Based Handover Scheme with Neighbor Beacon Frame Transmission

    Youngjun Kim1, Taekook Kim2, Hyungoo Choi1, Jinwoo Park1, Yeunwoong Kyung3,*

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 193-204, 2023, DOI:10.32604/iasc.2023.032784

    Abstract Mobility support to change the connection from one access point (AP) to the next (i.e., handover) becomes one of the important issues in IEEE 802.11 wireless local area networks (WLANs). During handover, the channel scanning procedure, which aims to collect neighbor AP (NAP) information on all available channels, accounts for most of the delay time. To reduce the channel scanning procedure, a neighbor beacon frame transmission scheme (N-BTS) was proposed for a seamless handover. N-BTS can provide a seamless handover by removing the channel scanning procedure. However, N-BTS always requires operating overhead even if there are few mobile stations (MSs)… More >

  • Open Access

    ARTICLE

    SMO Algorithm to Unravel CEED Problem using Wind and Solar

    A. Prabha1,*, G. Themozhi2, Rama Reddy Sathi3

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1857-1872, 2023, DOI:10.32604/iasc.2023.027442

    Abstract This research proposes a more advanced way to address Combined Economic Emission Dispatch (CEED) concerns. Economic Load Dispatch (ELD) and Economic Emission Dispatch (EED) have been implemented to reduce generating unit fuel costs and emissions. When both economics and emission targets are taken into account, the dispatch of an aggregate cost-effective emission challenge emerges. This research affords a mathematical modeling-based analytical technique for solving economic, emission, and collaborative economic and emission dispatch problems with only one goal. This study takes into account both the fuel cost target and the environmental impact of emissions. This bi-intention CEED problem is converted to… More >

  • Open Access

    ARTICLE

    Modified Satin Bowerbird for Distributed Generation in Remotely Controlled Voltage Bus

    K. Dharani Sree*, P. Karpagavalli

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 1181-1195, 2023, DOI:10.32604/iasc.2023.025303

    Abstract The distributed generators in the radial distribution network are to improve the Grid performance and its efficiency. These Distributed Generators control the PV bus; it is converted as a remote controlled PVQ bus. This PVQ bus reduces the power loss and reactive power. Initially, the distributed generators were placed in the system using mathematical modelling or the optimization. This approach improves the efficiency but it has no effect in loss minimization. To minimize the loss the reconfigured network with Genetic algorithm based Distributed generator placement proposed as existing work. This approach minimizes the loss effectively; but the genetic algorithm takes… More >

  • Open Access

    ARTICLE

    A Compact Quad-Band Sickle-Shaped Monopole Antenna for GSM 900/WiMax/WLAN Applications

    Sujit Goswami1,*, Sujit Kumar Mandal1, Soumen Banerjee2

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 397-410, 2022, DOI:10.32604/cmc.2022.025657

    Abstract In this paper a novel, compact, microstrip-fed, quad-band monopole antenna is presented for the application of Global System for Mobile communication (GSM 900), Worldwide Interoperability for Microwave Access (WiMAX) and Wireless Local Area Network (WLAN). The proposed antenna comprises of a sickle-shaped structure with four circular arc strips, and a modified rectangular ground plane. The four strips of the antenna are independently responsible for the four different resonant frequencies of the operating bands and can be tuned separately to control the radiation performance. The proposed quad-band antenna is designed to resonate at 940 MHz for GSM 900, 2.5 and 3.5 GHz for… More >

  • Open Access

    ARTICLE

    Analyzing and Enabling the Harmonious Coexistence of Heterogeneous Industrial Wireless Networks

    Bilal Khan1, Danish Shehzad1, Numan Shafi1, Ga-Young Kim2,*, Muhammad Umar Aftab1

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1671-1690, 2022, DOI:10.32604/cmc.2022.024918

    Abstract Nowadays multiple wireless communication systems operate in industrial environments side by side. In such an environment performance of one wireless network can be degraded by the collocated hostile wireless network having higher transmission power or higher carrier sensing threshold. Unlike the previous research works which considered IEEE 802.15.4 for the Industrial Wireless communication systems (iWCS) this paper examines the coexistence of IEEE 802.11 based iWCS used for delay-stringent communication in process automation and gWLAN (general-purpose WLAN) used for non-real time communication. In this paper, we present a Markov chain-based performance model that described the transmission failure of iWCS due to… More >

  • Open Access

    ARTICLE

    Cost and Efficiency Analysis of Steganography in the IEEE 802.11ah IoT Protocol

    Akram A. Almohammedi1,2,*, Vladimir Shepelev1, Sam Darshi3, Mohammed Balfaqih4, Fayad Ghawbar5

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3929-3943, 2022, DOI:10.32604/cmc.2022.026307

    Abstract The widespread use of the Internet of Things (IoT) applications has enormously increased the danger level of data leakage and theft in IoT as data transmission occurs through a public channel. As a result, the security of the IoT has become a serious challenge in the field of information security. Steganography on the network is a critical tool for preventing the leakage of private information and enabling secure and encrypted communication. The primary purpose of steganography is to conceal sensitive information in any form of media such as audio, video, text, or photos, and securely transfer it through wireless networks.… More >

  • Open Access

    ARTICLE

    IEEE802.11 Access Point's Service Set Identifier (SSID) for Localization and Tracking

    Mohammad Z. Masoud1,*, Yousef Jaradat1, Mohammad Alia2

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5459-5476, 2022, DOI:10.32604/cmc.2022.023781

    Abstract IEEE802.11, known as WiFi has proliferated in the last decade. It can be found in smartphones, laptops, smart TVs and surveillance cameras. This popularity has revealed many issues in health, data privacy and security. In this work, a WiFi measurement study has been conducted in Amman, the capital city of Jordan. An Android App has been written to harvest WiFi information of the transmitted frames of any surrounding Access points (APs). More than 240,000 APs information has been harvested in this work. The harvested data have been analyzed to find statistics of WiFi devices in this city. Moreover, three power… More >

Displaying 1-10 on page 1 of 17. Per Page