Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (11)
  • Open Access

    ARTICLE

    A Deep Reinforcement Learning with Gumbel Distribution Approach for Contention Window Optimization in IEEE 802.11 Networks

    Yi-Hao Tu, Yi-Wei Ma*

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 4563-4582, 2025, DOI:10.32604/cmc.2025.066899 - 30 July 2025

    Abstract This study introduces the Smart Exponential-Threshold-Linear with Double Deep Q-learning Network (SETL-DDQN) and an extended Gumbel distribution method, designed to optimize the Contention Window (CW) in IEEE 802.11 networks. Unlike conventional Deep Reinforcement Learning (DRL)-based approaches for CW size adjustment, which often suffer from overestimation bias and limited exploration diversity, leading to suboptimal throughput and collision performance. Our framework integrates the Gumbel distribution and extreme value theory to systematically enhance action selection under varying network conditions. First, SETL adopts a DDQN architecture (SETL-DDQN) to improve Q-value estimation accuracy and enhance training stability. Second, we incorporate a… More >

  • Open Access

    ARTICLE

    Multi-AP Cooperative Radio Resource Allocation Method for Co-Channel Interference Avoidance in 802.11be WLAN

    Sujie Shao, Zhengpu Wang*, Siya Xu, Shaoyong Guo, Xuesong Qiu

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 4949-4972, 2025, DOI:10.32604/cmc.2025.065053 - 30 July 2025

    Abstract With the exponential growth of mobile terminals and the widespread adoption of Internet of Things (IoT) technologies, an increasing number of devices rely on wireless local area networks (WLAN) for data transmission. To address this demand, deploying more access points (APs) has become an inevitable trend. While this approach enhances network coverage and capacity, it also exacerbates co-channel interference (CCI). The multi-AP cooperation introduced in IEEE 802.11be (Wi-Fi 7) represents a paradigm shift from conventional single-AP architectures, offering a novel solution to CCI through joint resource scheduling across APs. However, designing efficient cooperation mechanisms and… More >

  • Open Access

    ARTICLE

    Reinforcement Learning-Based Handover Scheme with Neighbor Beacon Frame Transmission

    Youngjun Kim1, Taekook Kim2, Hyungoo Choi1, Jinwoo Park1, Yeunwoong Kyung3,*

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 193-204, 2023, DOI:10.32604/iasc.2023.032784 - 29 September 2022

    Abstract Mobility support to change the connection from one access point (AP) to the next (i.e., handover) becomes one of the important issues in IEEE 802.11 wireless local area networks (WLANs). During handover, the channel scanning procedure, which aims to collect neighbor AP (NAP) information on all available channels, accounts for most of the delay time. To reduce the channel scanning procedure, a neighbor beacon frame transmission scheme (N-BTS) was proposed for a seamless handover. N-BTS can provide a seamless handover by removing the channel scanning procedure. However, N-BTS always requires operating overhead even if there More >

  • Open Access

    ARTICLE

    A Compact Quad-Band Sickle-Shaped Monopole Antenna for GSM 900/WiMax/WLAN Applications

    Sujit Goswami1,*, Sujit Kumar Mandal1, Soumen Banerjee2

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 397-410, 2022, DOI:10.32604/cmc.2022.025657 - 18 May 2022

    Abstract In this paper a novel, compact, microstrip-fed, quad-band monopole antenna is presented for the application of Global System for Mobile communication (GSM 900), Worldwide Interoperability for Microwave Access (WiMAX) and Wireless Local Area Network (WLAN). The proposed antenna comprises of a sickle-shaped structure with four circular arc strips, and a modified rectangular ground plane. The four strips of the antenna are independently responsible for the four different resonant frequencies of the operating bands and can be tuned separately to control the radiation performance. The proposed quad-band antenna is designed to resonate at 940 MHz for GSM More >

  • Open Access

    ARTICLE

    Analyzing and Enabling the Harmonious Coexistence of Heterogeneous Industrial Wireless Networks

    Bilal Khan1, Danish Shehzad1, Numan Shafi1, Ga-Young Kim2,*, Muhammad Umar Aftab1

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1671-1690, 2022, DOI:10.32604/cmc.2022.024918 - 18 May 2022

    Abstract Nowadays multiple wireless communication systems operate in industrial environments side by side. In such an environment performance of one wireless network can be degraded by the collocated hostile wireless network having higher transmission power or higher carrier sensing threshold. Unlike the previous research works which considered IEEE 802.15.4 for the Industrial Wireless communication systems (iWCS) this paper examines the coexistence of IEEE 802.11 based iWCS used for delay-stringent communication in process automation and gWLAN (general-purpose WLAN) used for non-real time communication. In this paper, we present a Markov chain-based performance model that described the transmission… More >

  • Open Access

    ARTICLE

    Cost and Efficiency Analysis of Steganography in the IEEE 802.11ah IoT Protocol

    Akram A. Almohammedi1,2,*, Vladimir Shepelev1, Sam Darshi3, Mohammed Balfaqih4, Fayad Ghawbar5

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3929-3943, 2022, DOI:10.32604/cmc.2022.026307 - 29 March 2022

    Abstract The widespread use of the Internet of Things (IoT) applications has enormously increased the danger level of data leakage and theft in IoT as data transmission occurs through a public channel. As a result, the security of the IoT has become a serious challenge in the field of information security. Steganography on the network is a critical tool for preventing the leakage of private information and enabling secure and encrypted communication. The primary purpose of steganography is to conceal sensitive information in any form of media such as audio, video, text, or photos, and securely… More >

  • Open Access

    ARTICLE

    Partially Overlapping Channel Assignment Using Bonded and Non-Bonded Channels in IEEE 802.11n WLAN

    Md. Selim Al Mamun1,2, Fatema Akhter1,*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3161-3178, 2022, DOI:10.32604/cmc.2022.022214 - 07 December 2021

    Abstract Nowadays, wireless local area network (WLAN) has become prevalent Internet access due to its low-cost gadgets, flexible coverage and hassle-free simple wireless installation. WLAN facilitates wireless Internet services to users with mobile devices like smart phones, tablets, and laptops through deployment of multiple access points (APs) in a network field. Every AP operates on a frequency band called channel. Popular wireless standard such as IEEE 802.11n has a limited number of channels where frequency spectrum of adjacent channels overlaps partially with each other. In a crowded environment, users may experience poor Internet services due to… More >

  • Open Access

    ARTICLE

    Investigation of Techniques for VoIP Frame Aggregation Over A-MPDU 802.11n

    Qasem M. Kharma*, Abdelrahman H. Hussein, Faris M. Taweel, Mosleh M. Abualhaj, Qusai Y. Shambour

    Intelligent Automation & Soft Computing, Vol.31, No.2, pp. 869-883, 2022, DOI:10.32604/iasc.2022.020415 - 22 September 2021

    Abstract The widespread and desirable features of IP and IEEE 802.11 networks have made these technologies a suitable medium for carrying voice over IP (VoIP). However, a bandwidth (BW) exploitation obstacle emerges when 802.11 networks are used to carry VoIP traffic. This BW exploitation obstacle is caused by the large 80-byte preamble size of the VoIP packet and a waiting time of 765 μs for each layer 2 VoIP frame. As a solution, IEEE 802.11n was consequently designed with a built-in layer 2 frame aggregation feature, but the adverse impact on the VoIP performance still needed More >

  • Open Access

    ARTICLE

    Performance Analysis and Throughput Enhancement of the STET Technique for WLAN IEEE 802.11ad

    M. Vanitha1,*, J. Kirubakaran2, K. Radhika2

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 571-579, 2022, DOI:10.32604/csse.2022.017663 - 09 September 2021

    Abstract The IEEE 802.11ad innovation has enabled the impact of remote devices in unauthorized 60 GHz unlicensed frequency band at Giga bits per second information transfer rate in speed concentrated 5G applications. We have presented an innovative work that deals with the upgradation of the ability of IEEE 802.11ad wireless LAN to make it suitable for wireless applications. An exact examination on the IEEE 802.11ad analysis has been carried out in this work to achieve the greatest throughput. This has pulled attraction in broad consideration for accomplishing the pinnacle transmission rate of 8 Gbit/s. IEEE 802.11ad… More >

  • Open Access

    ARTICLE

    An Efficient Medium Access Control Mechanism for Flying Ad-hoc Networks

    Muhammad Asghar Khan1,*, Fazal Noor2, Insaf Ullah3, Sajjad ur Rehman4, Shibli Nisar5, Mohaira Ahmad5

    Computer Systems Science and Engineering, Vol.38, No.1, pp. 47-63, 2021, DOI:10.32604/csse.2021.016430 - 01 April 2021

    Abstract The Flying Ad-hoc Networks (FANETs) is characterized by the transition from a single large Unmanned Aerial Vehicle (UAV) to multiple small UAVs connected in an ad-hoc fashion. Since high mobility is the core feature of such networks, they are prone to route breaks within the links. The issue of connectivity loss can be coped with, to some extent, by making use of omnidirectional antennas. Such modification, however, curtails Quality-of-Service (QoS) requirements of networks in terms of bandwidth, media access delay, coverage and others. Alternately, directional antennas have advantages over omnidirectional antennas such as improved transmission… More >

Displaying 1-10 on page 1 of 11. Per Page