Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (62)
  • Open Access

    ARTICLE

    A Decision-Based Hybrid Proxy Mobile IPv6 Scheme for Better Resources Utilization

    Habib Ullah Khan1,*, Anwar Hussain2, Shah Nazir2

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5151-5167, 2022, DOI:10.32604/cmc.2022.030837

    Abstract Seamless mobility is always one of the major requirements of modern-day communication. In a heterogeneous and massive IoT environment, efficient network-based mobility protocol such as proxy mobile IPv6 (PMIPv6), is potentially a good candidate for efficient mobility as well as resource utilization efficiency. Several extensions are devised for performance in the research domain. However, a multi-criterion decision-based resource-efficient PMIPv6 extension is required to achieve efficiency when network resources are overloaded. In this research, a multi-criterion decision-based PMIPv6 scheme is devised that provides better performance when the Local Mobility Anchor (LMA) or Mobile Access Gateway (MAG) is overloaded. The objective is… More >

  • Open Access

    ARTICLE

    An Improved Multi-Objective Particle Swarm Optimization Routing on MANET

    G. Rajeshkumar1,*, M. Vinoth Kumar2, K. Sailaja Kumar3, Surbhi Bhatia4, Arwa Mashat5, Pankaj Dadheech6

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1187-1200, 2023, DOI:10.32604/csse.2023.026137

    Abstract A Mobile Ad hoc Network (MANET) is a group of low-power consumption of wireless mobile nodes that configure a wireless network without the assistance of any existing infrastructure/centralized organization. The primary aim of MANETs is to extend flexibility into the self-directed, mobile, and wireless domain, in which a cluster of autonomous nodes forms a MANET routing system. An Intrusion Detection System (IDS) is a tool that examines a network for malicious behavior/policy violations. A network monitoring system is often used to report/gather any suspicious attacks/violations. An IDS is a software program or hardware system that monitors network/security traffic for malicious… More >

  • Open Access

    ARTICLE

    Kalman-Filtering-Based Frequency Control Strategy Considering Electrolytic Aluminum Load

    Yuqin Chen, Shihai Yang*, Yueping Kong, Mingming Chen

    Energy Engineering, Vol.119, No.4, pp. 1517-1529, 2022, DOI:10.32604/ee.2022.019646

    Abstract Traditional thermal power units are continuously replaced by renewable energies, of which fluctuations and intermittence impose pressure on the frequency stability of the power system. Electrolytic aluminum load (EAL) accounts for large amount of the local electric loads in some areas. The participation of EAL in local frequency control has huge application prospects. However, the controller design of EAL is difficult due to the measurement noise of the system frequency and the nonlinear dynamics of the EAL’s electric power consumption. Focusing on this problem, this paper proposes a control strategy for EAL to participate in the frequency control. For the… More >

  • Open Access

    ARTICLE

    FPGA Implementation of Elliptic-Curve Diffie Hellman Protocol

    Sikandar Zulqarnain Khan1,*, Sajjad Shaukat Jamal2, Asher Sajid3, Muhammad Rashid4

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1879-1894, 2022, DOI:10.32604/cmc.2022.028152

    Abstract This paper presents an efficient crypto processor architecture for key agreement using ECDH (Elliptic-curve Diffie Hellman) protocol over . The composition of our key-agreement architecture is expressed in consisting of the following: (i) Elliptic-curve Point Multiplication architecture for public key generation (DESIGN-I) and (ii) integration of DESIGN-I with two additional routing multiplexers and a controller for shared key generation (DESIGN-II). The arithmetic operators used in DESIGN-I and DESIGN-II contain an adder, squarer, a multiplier and inversion. A simple shift and add multiplication method is employed to retain lower hardware resources. Moreover, an essential inversion operation is operated using the Itoh-Tsujii… More >

  • Open Access

    ARTICLE

    Low-Cost IMU Sensors for Satellite Maturity Improvement

    Omar Ben Bahri*, Abdullah Alhumaidi Alotaibi

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1315-1326, 2022, DOI:10.32604/csse.2022.024979

    Abstract The satellite technology proves its impact in the modern era with its wide benefits and applications. However, the cost of the development in this field presents gaps in many countries, almost the developed countries. Therefore, this paper provides a rich platform around low-cost sensors in order to improve maturity in space technology, mostly the system of attitude determination and control. The development of this knowledge turns out to be very interesting in order to achieve a space mission which leads to the progression of the spatial technology readiness level (TRL) defined by the international measurement scale which is able to… More >

  • Open Access

    ARTICLE

    Kalman Filter and H Filter Based Linear Quadratic Regulator for Furuta Pendulum

    N. Arulmozhi1,*, T. Aruldoss Albert Victorie2

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 605-623, 2022, DOI:10.32604/csse.2022.023376

    Abstract This paper deals with Furuta Pendulum (FP) or Rotary Inverted Pendulum (RIP), which is an under-actuated non-minimum unstable non-linear process. The process considered along with uncertainties which are unmodelled and analyses the performance of Linear Quadratic Regulator (LQR) with Kalman filter and H filter as two filter configurations. The LQR is a technique for developing practical feedback, in addition the desired x shows the vector of desirable states and is used as the external input to the closed-loop system. The effectiveness of the two filters in FP or RIP are measured and contrasted with rise time, peak time, settling time… More >

  • Open Access

    ARTICLE

    Self-Balancing Vehicle Based on Adaptive Neuro-Fuzzy Inference System

    M. L. Ramamoorthy1, S. Selvaperumal2,*, G. Prabhakar3

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 485-497, 2022, DOI:10.32604/iasc.2022.025824

    Abstract The scope of this research is to design and fuse the sensors used in the self-balancing vehicle through Adaptive Neuro-Fuzzy Inference systems (ANFIS) algorithm to optimize the output. The self-balancing vehicle is a wheeled inverted pendulum, which is extremely complex, nonlinear and unstable. Homogeneous and Heterogeneous sensors are involved in this sensor fusion research to identify the best feasible value among them. The data fusion algorithm present inside the controller of the self-balancing vehicle makes the inputs of the homogeneous sensors and heterogeneous sensors separately for ameliorate surrounding perception. Simulation is performed by modeling the sensors in Simulink. The outcomes… More >

  • Open Access

    ARTICLE

    Enhanced Route Optimization for Wireless Networks Using Meta-Heuristic Engineering

    S. Navaneetha Krishnan1, P. Sundara Vadivel2,*, D. Yuvaraj3, T. Satyanarayana Murthy4, Sree Jagadeesh Malla5, S. Nachiyappan6, S. Shanmuga Priya7

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 17-26, 2022, DOI:10.32604/csse.2022.021590

    Abstract Wireless Sensor Networks (WSN) are commonly used to observe and monitor precise environments. WSNs consist of a large number of inexpensive sensor nodes that have been separated and distributed in different environments. The base station received the amount of data collected by the numerous sensors. The current developments designate that the attentFgion in applications of WSNs has been increased and extended to a very large scale. The Trust-Based Adaptive Acknowledgement (TRAACK) Intrusion-Detection System for Wireless Sensor Networks (WSN) is described based on the number of active positive deliveries and The Kalman filter used in Modified Particle Swarm Optimization (MPSO) has… More >

  • Open Access

    ARTICLE

    Prognostic Kalman Filter Based Bayesian Learning Model for Data Accuracy Prediction

    S. Karthik1, Robin Singh Bhadoria2, Jeong Gon Lee3,*, Arun Kumar Sivaraman4, Sovan Samanta5, A. Balasundaram6, Brijesh Kumar Chaurasia7, S. Ashokkumar8

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 243-259, 2022, DOI:10.32604/cmc.2022.023864

    Abstract Data is always a crucial issue of concern especially during its prediction and computation in digital revolution. This paper exactly helps in providing efficient learning mechanism for accurate predictability and reducing redundant data communication. It also discusses the Bayesian analysis that finds the conditional probability of at least two parametric based predictions for the data. The paper presents a method for improving the performance of Bayesian classification using the combination of Kalman Filter and K-means. The method is applied on a small dataset just for establishing the fact that the proposed algorithm can reduce the time for computing the clusters… More >

  • Open Access

    ARTICLE

    Identification and Classification of Crowd Activities

    Manar Elshahawy1, Ahmed O. Aseeri2,*, Shaker El-Sappagh3,4, Hassan Soliman1, Mohammed Elmogy1, Mervat Abu-Elkheir5

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 815-832, 2022, DOI:10.32604/cmc.2022.023852

    Abstract The identification and classification of collective people's activities are gaining momentum as significant themes in machine learning, with many potential applications emerging. The need for representation of collective human behavior is especially crucial in applications such as assessing security conditions and preventing crowd congestion. This paper investigates the capability of deep neural network (DNN) algorithms to achieve our carefully engineered pipeline for crowd analysis. It includes three principal stages that cover crowd analysis challenges. First, individual's detection is represented using the You Only Look Once (YOLO) model for human detection and Kalman filter for multiple human tracking; Second, the density… More >

Displaying 21-30 on page 3 of 62. Per Page