Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (226)
  • Open Access

    ARTICLE

    AI-Driven Energy Optimization in UAV-Assisted Routing for Enhanced Wireless Sensor Networks Performance

    Syed Kamran Haider1,2, Abbas Ahmed2, Noman Mujeeb Khan2, Ali Nauman3,*, Sung Won Kim3,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4085-4110, 2024, DOI:10.32604/cmc.2024.052997 - 12 September 2024

    Abstract In recent advancements within wireless sensor networks (WSN), the deployment of unmanned aerial vehicles (UAVs) has emerged as a groundbreaking strategy for enhancing routing efficiency and overall network functionality. This research introduces a sophisticated framework, driven by computational intelligence, that merges clustering techniques with UAV mobility to refine routing strategies in WSNs. The proposed approach divides the sensor field into distinct sectors and implements a novel weighting system for the selection of cluster heads (CHs). This system is primarily aimed at reducing energy consumption through meticulously planned routing and path determination. Employing a greedy algorithm More >

  • Open Access

    ARTICLE

    Bio-Inspired Intelligent Routing in WSN: Integrating Mayfly Optimization and Enhanced Ant Colony Optimization for Energy-Efficient Cluster Formation and Maintenance

    V. G. Saranya*, S. Karthik

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 127-150, 2024, DOI:10.32604/cmes.2024.053825 - 20 August 2024

    Abstract Wireless Sensor Networks (WSNs) are a collection of sensor nodes distributed in space and connected through wireless communication. The sensor nodes gather and store data about the real world around them. However, the nodes that are dependent on batteries will ultimately suffer an energy loss with time, which affects the lifetime of the network. This research proposes to achieve its primary goal by reducing energy consumption and increasing the network’s lifetime and stability. The present technique employs the hybrid Mayfly Optimization Algorithm-Enhanced Ant Colony Optimization (MFOA-EACO), where the Mayfly Optimization Algorithm (MFOA) is used to… More >

  • Open Access

    ARTICLE

    Risk-Balanced Routing Strategy for Service Function Chains of Cyber-Physical Power System Considering Cross-Space Cascading Failure

    He Wang, Xingyu Tong, Huanan Yu*, Xiao Hu, Jing Bian

    Energy Engineering, Vol.121, No.9, pp. 2525-2542, 2024, DOI:10.32604/ee.2024.050594 - 19 August 2024

    Abstract Cyber-physical power system (CPPS) has significantly improved the operational efficiency of power systems. However, cross-space cascading failures may occur due to the coupling characteristics, which poses a great threat to the safety and reliability of CPPS, and there is an acute need to reduce the probability of these failures. Towards this end, this paper first proposes a cascading failure index to identify and quantify the importance of different information in the same class of communication services. On this basis, a joint improved risk-balanced service function chain routing strategy (SFC-RS) is proposed, which is modeled as More >

  • Open Access

    ARTICLE

    A Traffic-Aware and Cluster-Based Energy Efficient Routing Protocol for IoT-Assisted WSNs

    Hina Gul1, Sana Ullah1, Ki-Il Kim2,*, Farman Ali3

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 1831-1850, 2024, DOI:10.32604/cmc.2024.052841 - 15 August 2024

    Abstract The seamless integration of intelligent Internet of Things devices with conventional wireless sensor networks has revolutionized data communication for different applications, such as remote health monitoring, industrial monitoring, transportation, and smart agriculture. Efficient and reliable data routing is one of the major challenges in the Internet of Things network due to the heterogeneity of nodes. This paper presents a traffic-aware, cluster-based, and energy-efficient routing protocol that employs traffic-aware and cluster-based techniques to improve the data delivery in such networks. The proposed protocol divides the network into clusters where optimal cluster heads are selected among super… More >

  • Open Access

    ARTICLE

    Enhancing Network Design through Statistical Evaluation of MANET Routing Protocols

    Ibrahim Alameri1,*, Tawfik Al-Hadhrami2, Anjum Nazir3, Abdulsamad Ebrahim Yahya4, Atef Gharbi5

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 319-339, 2024, DOI:10.32604/cmc.2024.052999 - 18 July 2024

    Abstract This paper contributes a sophisticated statistical method for the assessment of performance in routing protocols salient Mobile Ad Hoc Network (MANET) routing protocols: Destination Sequenced Distance Vector (DSDV), Ad hoc On-Demand Distance Vector (AODV), Dynamic Source Routing (DSR), and Zone Routing Protocol (ZRP). In this paper, the evaluation will be carried out using complete sets of statistical tests such as Kruskal-Wallis, Mann-Whitney, and Friedman. It articulates a systematic evaluation of how the performance of the previous protocols varies with the number of nodes and the mobility patterns. The study is premised upon the Quality of More >

  • Open Access

    ARTICLE

    Improving Network Availability through Optimized Multipath Routing and Incremental Deployment Strategies

    Wei Zhang1, Haijun Geng2,*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 427-448, 2024, DOI:10.32604/cmc.2024.051871 - 18 July 2024

    Abstract Currently, distributed routing protocols are constrained by offering a single path between any pair of nodes, thereby limiting the potential throughput and overall network performance. This approach not only restricts the flow of data but also makes the network susceptible to failures in case the primary path is disrupted. In contrast, routing protocols that leverage multiple paths within the network offer a more resilient and efficient solution. Multipath routing, as a fundamental concept, surpasses the limitations of traditional shortest path first protocols. It not only redirects traffic to unused resources, effectively mitigating network congestion, but… More >

  • Open Access

    ARTICLE

    In-Depth Study of Potential-Based Routing and New Exploration of Its Scheduling Integration

    Jihoon Sung1, Yeunwoong Kyung2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2891-2911, 2024, DOI:10.32604/cmes.2024.051772 - 08 July 2024

    Abstract Industrial wireless mesh networks (WMNs) have been widely deployed in various industrial sectors, providing services such as manufacturing process monitoring, equipment control, and sensor data collection. A notable characteristic of industrial WMNs is their distinct traffic pattern, where the majority of traffic flows originate from mesh nodes and are directed towards mesh gateways. In this context, this paper adopts and revisits a routing algorithm known as ALFA (autonomous load-balancing field-based anycast routing), tailored specifically for anycast (one-to-one-of-many) networking in WMNs, where traffic flows can be served through any one of multiple gateways. In essence, the… More >

  • Open Access

    ARTICLE

    CoopAI-Route: DRL Empowered Multi-Agent Cooperative System for Efficient QoS-Aware Routing for Network Slicing in Multi-Domain SDN

    Meignanamoorthi Dhandapani*, V. Vetriselvi, R. Aishwarya

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2449-2486, 2024, DOI:10.32604/cmes.2024.050986 - 08 July 2024

    Abstract The emergence of beyond 5G networks has the potential for seamless and intelligent connectivity on a global scale. Network slicing is crucial in delivering services for different, demanding vertical applications in this context. Next-generation applications have time-sensitive requirements and depend on the most efficient routing path to ensure packets reach their intended destinations. However, the existing IP (Internet Protocol) over a multi-domain network faces challenges in enforcing network slicing due to minimal collaboration and information sharing among network operators. Conventional inter-domain routing methods, like Border Gateway Protocol (BGP), cannot make routing decisions based on performance,… More >

  • Open Access

    ARTICLE

    QoS Routing Optimization Based on Deep Reinforcement Learning in SDN

    Yu Song1, Xusheng Qian2, Nan Zhang3, Wei Wang2, Ao Xiong1,*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3007-3021, 2024, DOI:10.32604/cmc.2024.051217 - 15 May 2024

    Abstract To enhance the efficiency and expediency of issuing e-licenses within the power sector, we must confront the challenge of managing the surging demand for data traffic. Within this realm, the network imposes stringent Quality of Service (QoS) requirements, revealing the inadequacies of traditional routing allocation mechanisms in accommodating such extensive data flows. In response to the imperative of handling a substantial influx of data requests promptly and alleviating the constraints of existing technologies and network congestion, we present an architecture for QoS routing optimization with in Software Defined Network (SDN), leveraging deep reinforcement learning. This… More >

  • Open Access

    REVIEW

    Towards Blockchain-Based Secure BGP Routing, Challenges and Future Research Directions

    Qiong Yang1, Li Ma1,2,*, Shanshan Tu1, Sami Ullah3, Muhammad Waqas4,5, Hisham Alasmary6

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2035-2062, 2024, DOI:10.32604/cmc.2024.049970 - 15 May 2024

    Abstract Border Gateway Protocol (BGP) is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different destinations. The BGP protocol exhibits security design defects, such as an unconditional trust mechanism and the default acceptance of BGP route announcements from peers by BGP neighboring nodes, easily triggering prefix hijacking, path forgery, route leakage, and other BGP security threats. Meanwhile, the traditional BGP security mechanism, relying on a public key infrastructure, faces issues like a single point of failure and a single point of trust. The decentralization, anti-tampering, and More >

Displaying 11-20 on page 2 of 226. Per Page