Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (11)
  • Open Access

    ARTICLE

    A Model Training Method for DDoS Detection Using CTGAN under 5GC Traffic

    Yea-Sul Kim1, Ye-Eun Kim1, Hwankuk Kim2,*

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1125-1147, 2023, DOI:10.32604/csse.2023.039550

    Abstract With the commercialization of 5th-generation mobile communications (5G) networks, a large-scale internet of things (IoT) environment is being built. Security is becoming increasingly crucial in 5G network environments due to the growing risk of various distributed denial of service (DDoS) attacks across vast IoT devices. Recently, research on automated intrusion detection using machine learning (ML) for 5G environments has been actively conducted. However, 5G traffic has insufficient data due to privacy protection problems and imbalance problems with significantly fewer attack data. If this data is used to train an ML model, it will likely suffer from generalization errors due to… More >

  • Open Access

    ARTICLE

    Automated Disabled People Fall Detection Using Cuckoo Search with Mobile Networks

    Mesfer Al Duhayyim*

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2473-2489, 2023, DOI:10.32604/iasc.2023.033585

    Abstract Falls are the most common concern among older adults or disabled people who use scooters and wheelchairs. The early detection of disabled persons’ falls is required to increase the living rate of an individual or provide support to them whenever required. In recent times, the arrival of the Internet of Things (IoT), smartphones, Artificial Intelligence (AI), wearables and so on make it easy to design fall detection mechanisms for smart homecare. The current study develops an Automated Disabled People Fall Detection using Cuckoo Search Optimization with Mobile Networks (ADPFD-CSOMN) model. The proposed model’s major aim is to detect and distinguish… More >

  • Open Access

    ARTICLE

    Modeling and Analysis of UAV-Assisted Mobile Network with Imperfect Beam Alignment

    Mohamed Amine Ouamri1,2, Reem Alkanhel3,*, Cedric Gueguen1, Manal Abdullah Alohali4, Sherif S. M. Ghoneim5

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 453-467, 2023, DOI:10.32604/cmc.2023.031450

    Abstract With the rapid development of emerging 5G and beyond (B5G), Unmanned Aerial Vehicles (UAVs) are increasingly important to improve the performance of dense cellular networks. As a conventional metric, coverage probability has been widely studied in communication systems due to the increasing density of users and complexity of the heterogeneous environment. In recent years, stochastic geometry has attracted more attention as a mathematical tool for modeling mobile network systems. In this paper, an analytical approach to the coverage probability analysis of UAV-assisted cellular networks with imperfect beam alignment has been proposed. An assumption was considered that all users are distributed… More >

  • Open Access

    ARTICLE

    Multivariate Aggregated NOMA for Resource Aware Wireless Network Communication Security

    V. Sridhar1, K.V. Ranga Rao2, Saddam Hussain3,*, Syed Sajid Ullah4, Roobaea Alroobaea5, Maha Abdelhaq6, Raed Alsaqour7

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1693-1708, 2023, DOI:10.32604/cmc.2023.028129

    Abstract Nonorthogonal Multiple Access (NOMA) is incorporated into the wireless network systems to achieve better connectivity, spectral and energy effectiveness, higher data transfer rate, and also obtain the high quality of services (QoS). In order to improve throughput and minimum latency, a Multivariate Renkonen Regressive Weighted Preference Bootstrap Aggregation based Nonorthogonal Multiple Access (MRRWPBA-NOMA) technique is introduced for network communication. In the downlink transmission, each mobile device's resources and their characteristics like energy, bandwidth, and trust are measured. Followed by, the Weighted Preference Bootstrap Aggregation is applied to recognize the resource-efficient mobile devices for aware data transmission by constructing the different… More >

  • Open Access

    ARTICLE

    TP-MobNet: A Two-pass Mobile Network for Low-complexity Classification of Acoustic Scene

    Soonshin Seo1, Junseok Oh2, Eunsoo Cho2, Hosung Park2, Gyujin Kim2, Ji-Hwan Kim2,*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3291-3303, 2022, DOI:10.32604/cmc.2022.026259

    Abstract Acoustic scene classification (ASC) is a method of recognizing and classifying environments that employ acoustic signals. Various ASC approaches based on deep learning have been developed, with convolutional neural networks (CNNs) proving to be the most reliable and commonly utilized in ASC systems due to their suitability for constructing lightweight models. When using ASC systems in the real world, model complexity and device robustness are essential considerations. In this paper, we propose a two-pass mobile network for low-complexity classification of the acoustic scene, named TP-MobNet. With inverse residuals and linear bottlenecks, TP-MobNet is based on MobileNetV2, and following mobile blocks,… More >

  • Open Access

    ARTICLE

    Enhance Vertical Handover Security During Execution Phase in Mobile Networks

    Omar Khattab*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3863-3875, 2022, DOI:10.32604/cmc.2022.026102

    Abstract The Vertical Handover (VHO) is one of the most vital features provided for the heterogeneous mobile networks. It allows Mobile Users (MUs) to keep ongoing sessions without disruption while they continuously move between different Radio Access Technologies (RATs) such as Wireless Fidelity (Wi-Fi), Global System for Mobile Communication (GSM), Universal Mobile Telecommunications System (UMTS), Long Term Evolution (LTE) and Fifth Generation (5G). In order to fulfill this goal, the VHO must comply to three main phases: starting of collecting the required information and then passing it for decision phase to obtain the best available RAT for performing VHO by execution… More >

  • Open Access

    ARTICLE

    A New Handover Management Model for Two-Tier 5G Mobile Networks

    Mohammad Arifin Rahman Khan1,*, Mohammed Golam Kaosar2, Mohammad Shorfuzzaman3, Kire Jakimoski4

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5491-5509, 2022, DOI:10.32604/cmc.2022.024212

    Abstract There has been an exponential rise in mobile data traffic in recent times due to the increasing popularity of portable devices like tablets, smartphones, and laptops. The rapid rise in the use of these portable devices has put extreme stress on the network service providers while forcing telecommunication engineers to look for innovative solutions to meet the increased demand. One solution to the problem is the emergence of fifth-generation (5G) wireless communication, which can address the challenges by offering very broad wireless area capacity and potential cut-power consumption. The application of small cells is the fundamental mechanism for the 5G… More >

  • Open Access

    ARTICLE

    Rule-Based Anomaly Detection Model with Stateful Correlation Enhancing Mobile Network Security

    Rafia Afzal, Raja Kumar Murugesan*

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1825-1841, 2022, DOI:10.32604/iasc.2022.020598

    Abstract The global Signalling System No. 7 (SS7) network protocol standard has been developed and regulated based only on trusted partner networks. The SS7 network protocol by design neither secures the communication channel nor verifies the entire network peers. The SS7 network protocol used in telecommunications has deficiencies that include verification of actual subscribers, precise location, subscriber’s belonging to a network, absence of illegitimate message filtering mechanism, and configuration deficiencies in home routing networks. Attackers can take advantage of these deficiencies and exploit them to impose threats such as subscriber or network data disclosure, intercept mobile traffic, perform account frauds, track… More >

  • Open Access

    ARTICLE

    Using Blockchain Technology in Mobile Network to create decentralized Home Location Registry (HLR)

    Behnam Kiani Kalejahi1,2,*, Ruslan Eminov1, Aga Guliyev1

    Computer Systems Science and Engineering, Vol.39, No.2, pp. 287-296, 2021, DOI:10.32604/csse.2021.05480

    Abstract Blockchain can mean many things to many people. It is a set of protocols and encryption technologies for securely storing data on a distributed network for the developers. It is a distributed ledger for business and finance and the technology underlying the explosion of new digital currencies. For technologists, it is the driving force behind the next generation of the internet. On the other hand, it is a transformational technology facilitating large-scale human progress in previously unimagined ways for the rest of the people, a tool for radically reshaping society and economy. Some view it as a disruptive technology that… More >

  • Open Access

    ARTICLE

    Powering Mobile Networks with Optimal Green Energy for Sustainable Development

    Mohammed H. Alsharif1, Mahmoud A. Albreem2, Abu Jahid3, Kannadasan Raju4, Peerapong Uthansakul5,*, Jamel Nebhen6, Venkatesan Chandrasekaran4, Ayman A. Aly7

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 661-677, 2021, DOI:10.32604/cmc.2021.017059

    Abstract Green wireless networking is an emerging area for many societies, especially academia and industry, in light of economic and ecological perspectives. Empowering wireless infrastructures exploiting green power sources can enhance sustainability due to the adverse effects of conventional power sources and atmospheric circumstances. Moreover, the specific power supply requirements for a base station (BS), such as cost effectiveness, efficiency, sustainability, and reliability, can be met by utilizing technological advances in renewable energy. Numerous drivers and motivators are involved in the deployment of renewable energy technologies and the transition toward green energy. Renewable energy is free, clean, and abundant in most… More >

Displaying 1-10 on page 1 of 11. Per Page