Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (6)
  • Open Access

    ARTICLE

    Priority Based Energy Efficient MAC Protocol by Varying Data Rate for Wireless Body Area Network

    R. Sangeetha, Usha Devi Gandhi*

    Computer Systems Science and Engineering, Vol.48, No.2, pp. 395-411, 2024, DOI:10.32604/csse.2023.041217

    Abstract Wireless Body Area Network (WBAN) is a cutting-edge technology that is being used in healthcare applications to monitor critical events in the human body. WBAN is a collection of in-body and on-body sensors that monitor human physical parameters such as temperature, blood pressure, pulse rate, oxygen level, body motion, and so on. They sense the data and communicate it to the Body Area Network (BAN) Coordinator. The main challenge for the WBAN is energy consumption. These issues can be addressed by implementing an effective Medium Access Control (MAC) protocol that reduces energy consumption and increases network lifetime. The purpose of… More >

  • Open Access

    ARTICLE

    An Efficient MPPT Tracking in Solar PV System with Smart Grid Enhancement Using CMCMAC Protocol

    B. Jegajothi1,*, Sundaram Arumugam2, Neeraj Kumar Shukla3, I. Kathir4, P. Yamunaa5, Monia Digra6

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2417-2437, 2023, DOI:10.32604/csse.2023.038074

    Abstract Renewable energy sources like solar, wind, and hydro are becoming increasingly popular due to the fewer negative impacts they have on the environment. Because, Since the production of renewable energy sources is still in the process of being created, photovoltaic (PV) systems are commonly utilized for installation situations that are acceptable, clean, and simple. This study presents an adaptive artificial intelligence approach that can be used for maximum power point tracking (MPPT) in solar systems with the help of an embedded controller. The adaptive method incorporates both the Whale Optimization Algorithm (WOA) and the Artificial Neural Network (ANN). The WOA… More >

  • Open Access

    ARTICLE

    An Effective Secure MAC Protocol for Cognitive Radio Networks

    Bayan Al-Amri1, Gofran Sami2, Wajdi Alhakami1,*

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 133-148, 2022, DOI:10.32604/csse.2022.021543

    Abstract The vast revolution in networking is increasing rapidly along with technology advancements, which requires more effort from all cyberspace professionals to cope with the challenges that come with advanced technology privileges and services. Hence, Cognitive Radio Network is one of the promising approaches that permit a dynamic type of smart network for improving the utilization of idle spectrum portions of wireless communications. However, it is vulnerable to security threats and attacks and demands security mechanisms to preserve and protect the cognitive radio networks for ensuring a secure communication environment. This paper presents an effective secure MAC protocol for cognitive radio… More >

  • Open Access

    ARTICLE

    Efficient MAC Protocols for Brain Computer Interface Applications

    Shams Al Ajrawi1,*, Ramesh Rao2, Mahasweta Sarkar3

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 589-605, 2021, DOI:10.32604/cmc.2021.016930

    Abstract Brain computer interface (BCI) systems permit individuals with motor disorders to utilize their thoughts as a mean to control external devices. BCI is a promising interdisciplinary field that gained the attention of many researchers. Yet, the development of BCI systems is facing several challenges, such as network lifetime. The Medium Access Control (MAC) Protocol is the bottle- neck of network reliability. There are many MAC protocols that can be utilized for dependable transmission in BCI applications by altering their control parameters. However, modifying these parameters is another source of concern due to the scarcity in knowledge about the effect of… More >

  • Open Access

    ARTICLE

    Collision Observation-Based Optimization of Low-Power and Lossy IoT Network Using Reinforcement Learning

    Arslan Musaddiq1, Rashid Ali2, Jin-Ghoo Choi1, Byung-Seo Kim3,*, Sung-Won Kim1

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 799-814, 2021, DOI:10.32604/cmc.2021.014751

    Abstract The Internet of Things (IoT) has numerous applications in every domain, e.g., smart cities to provide intelligent services to sustainable cities. The next-generation of IoT networks is expected to be densely deployed in a resource-constrained and lossy environment. The densely deployed nodes producing radically heterogeneous traffic pattern causes congestion and collision in the network. At the medium access control (MAC) layer, mitigating channel collision is still one of the main challenges of future IoT networks. Similarly, the standardized network layer uses a ranking mechanism based on hop-counts and expected transmission counts (ETX), which often does not adapt to the dynamic… More >

  • Open Access

    ARTICLE

    Multi-Rate Polling: Improve the Performance of Energy Harvesting Backscatter Wireless Networks

    Yu Han1,*, Wenxian Zheng2, Guangjun Wen1, Chu Chu1, Jian Su3, Yibo Zhang4

    CMC-Computers, Materials & Continua, Vol.60, No.2, pp. 795-812, 2019, DOI:10.32604/cmc.2019.05719

    Abstract In recent years, Researchers have proposed the concept of Energy Harvesting Backscatter Wireless Networks (EHBWN). EHBWN usually consists of one sink and several backscatter nodes. Backscatter nodes harvest energy from their environment and communicate with sink through backscattering the carrier wave transmitted by sink. Although a certain amount of access protocols for Energy Harvesting Wireless Networks have been present, they usually do not take the sink’s receiver sensitivity into account, which makes those protocols unsuitable in practice. In this paper, we first give an analysis of the backscatter channel link budget and the relationship between the effective communication range and… More >

Displaying 1-10 on page 1 of 6. Per Page