Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (212)
  • Open Access

    ARTICLE

    Experimental Study on Ratio and Performance of Coal Gangue/Bottom Ash Geopolymer Double-Liquid Grouting Material

    Wenqi Zhao1, Wenbin Sun1,2,3,*, Zhenbo Cao1, Jianbang Hao1

    Journal of Renewable Materials, Vol.11, No.7, pp. 3073-3089, 2023, DOI:10.32604/jrm.2023.026409

    Abstract Mine grouting reinforcement and water plugging projects often require large amounts of grouting materials. To reduce the carbon emission of grouting material production, improve the utilization of solid waste from mining enterprises, and meet the needs of mine reinforcement and seepage control, a double-liquid grouting material containing a high admixture of coal gangue powder/bottom ash geopolymer was studied. The setting time, fluidity, bleeding rate, and mechanical properties of grouting materials were studied through laboratory tests, and SEM analyzed the microstructure of the materials. The results show that the total mixture of calcined gangue does not More >

  • Open Access

    ARTICLE

    T_GRASP: Optimization Algorithm of Ship Avoiding Typhoon Route

    Yingxian Huang, Xueyan Ding, Yanan Zhang, Leiming Yan*

    Journal of Quantum Computing, Vol.4, No.2, pp. 85-95, 2022, DOI:10.32604/jqc.2022.031436

    Abstract A GRASP-based algorithm called T_GRASP for avoiding typhoon route optimization is suggested to increase the security and effectiveness of ship navigation. One of the worst natural calamities that can disrupt a ship’s navigation and result in numerous safety mishaps is a typhoon. Currently, the captains manually review the collected weather data and steer clear of typhoons using their navigational expertise. The distribution of heavy winds and waves produced by the typhoon also changes dynamically as a result of the surrounding large-scale air pressure distribution, which significantly enhances the challenge of the captain’s preparation for avoiding… More >

  • Open Access

    ARTICLE

    Energy Efficient Green Routing for UAVs Ad-Hoc Network

    M. Muthukumar1, Rajasekar Rangasamy2, Irshad Hussain3,4, Salman A. AlQahtani4,*

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 1111-1127, 2023, DOI:10.32604/iasc.2023.034369

    Abstract The purpose of this article is to propose Stability-based Energy-Efficient Link-State Hybrid Routing (S-ELHR), a low latency routing protocol that aims to provide a stable mechanism for routing in unmanned aerial vehicles (UAV). The S-ELHR protocol selects a number of network nodes to create a Connected Dominating Set (CDS) using a parameter known as the Stability Metric (SM). The SM considers the node’s energy usage, connectivity time, and node’s degree. Only the highest SM nodes are chosen to form CDS. Each node declares a Willingness to indicate that it is prepared to serve as a… More >

  • Open Access

    ARTICLE

    Intrusion Detection System Through Deep Learning in Routing MANET Networks

    Zainab Ali Abbood1,2,*, Doğu Çağdaş Atilla3,4, Çağatay Aydin5

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 269-281, 2023, DOI:10.32604/iasc.2023.035276

    Abstract Deep learning (DL) is a subdivision of machine learning (ML) that employs numerous algorithms, each of which provides various explanations of the data it consumes; mobile ad-hoc networks (MANET) are growing in prominence. For reasons including node mobility, due to MANET’s potential to provide small-cost solutions for real-world contact challenges, decentralized management, and restricted bandwidth, MANETs are more vulnerable to security threats. When protecting MANETs from attack, encryption and authentication schemes have their limits. However, deep learning (DL) approaches in intrusion detection systems (IDS) can adapt to the changing environment of MANETs and allow a… More >

  • Open Access

    ARTICLE

    Coati Optimization-Based Energy Efficient Routing Protocol for Unmanned Aerial Vehicle Communication

    Hanan Abdullah Mengash1, Hamed Alqahtani2, Mohammed Maray3, Mohamed K. Nour4, Radwa Marzouk1, Mohammed Abdullah Al-Hagery5, Heba Mohsen6, Mesfer Al Duhayyim7,*

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 4805-4820, 2023, DOI:10.32604/cmc.2023.037810

    Abstract With the flexible deployment and high mobility of Unmanned Aerial Vehicles (UAVs) in an open environment, they have generated considerable attention in military and civil applications intending to enable ubiquitous connectivity and foster agile communications. The difficulty stems from features other than mobile ad-hoc network (MANET), namely aerial mobility in three-dimensional space and often changing topology. In the UAV network, a single node serves as a forwarding, transmitting, and receiving node at the same time. Typically, the communication path is multi-hop, and routing significantly affects the network’s performance. A lot of effort should be invested… More >

  • Open Access

    ARTICLE

    Real-Time Data Transmission with Data Carrier Support Value in Neighbor Strategic Collection in WSN

    S. Ponnarasi1,*, T. Rajendran2

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 6039-6057, 2023, DOI:10.32604/cmc.2023.035499

    Abstract An efficient trust-aware secure routing and network strategy-based data collection scheme is presented in this paper to enhance the performance and security of wireless sensor networks during data collection. The method first discovers the routes between the data sensors and the sink node. Several factors are considered for each sensor node along the route, including energy, number of neighbours, previous transmissions, and energy depletion ratio. Considering all these variables, the Sink Reachable Support Measure and the Secure Communication Support Measure, the method evaluates two distinct measures. The method calculates the data carrier support value using… More >

  • Open Access

    ARTICLE

    Memory-Occupied Routing Algorithms for Quantum Relay Networks

    Jiangyuan Yao1, Kaiwen Zou2, Zheng Jiang2, Shuhua Weng1, Deshun Li1,*, Yahui Li3, Xingcan Cao4

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5929-5946, 2023, DOI:10.32604/cmc.2023.031284

    Abstract Quantum transmission experiments have shown that the successful transmission rate of entangled quanta in optical fibers decreases exponentially. Although current quantum networks deploy quantum relays to establish long-distance connections, the increase in transmission distance and entanglement switching costs still need to be considered when selecting the next hop. However, most of the existing quantum network models prefer to consider the parameters of the physical layer, which ignore the influence factors of the network layer. In this paper, we propose a meshy quantum network model based on quantum teleportation, which considers both network layer and physical… More >

  • Open Access

    ARTICLE

    Improved QoS-Secure Routing in MANET Using Real-Time Regional ME Feature Approximation

    Y. M. Mahaboob John1,*, G. Ravi2

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3653-3666, 2023, DOI:10.32604/csse.2023.036916

    Abstract Mobile Ad-hoc Network (MANET) routing problems are thoroughly studied several approaches are identified in support of MANET. Improve the Quality of Service (QoS) performance of MANET is achieving higher performance. To reduce this drawback, this paper proposes a new secure routing algorithm based on real-time partial ME (Mobility, energy) approximation. The routing method RRME (Real-time Regional Mobility Energy) divides the whole network into several parts, and each node’s various characteristics like mobility and energy are randomly selected neighbors accordingly. It is done in the path discovery phase, estimated to identify and remove malicious nodes. In… More >

  • Open Access

    ARTICLE

    Energy Based Random Repeat Trust Computation in Delay Tolerant Network

    S. Dheenathayalan*, B. Paramasivan

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 2845-2859, 2023, DOI:10.32604/csse.2023.033326

    Abstract As the use of mobile devices continues to rise, trust administration will significantly improve security in routing the guaranteed quality of service (QoS) supply in Mobile Ad Hoc Networks (MANET) due to the mobility of the nodes. There is no continuance of network communication between nodes in a delay-tolerant network (DTN). DTN is designed to complete recurring connections between nodes. This approach proposes a dynamic source routing protocol (DSR) based on a feed-forward neural network (FFNN) and energy-based random repetition trust calculation in DTN. If another node is looking for a node that swerved off… More >

  • Open Access

    ARTICLE

    Energy-Efficient Clustering Using Optimization with Locust Game Theory

    P. Kavitha Rani1, Hee-Kwon Chae2, Yunyoung Nam2,*, Mohamed Abouhawwash3,4

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2591-2605, 2023, DOI:10.32604/iasc.2023.033697

    Abstract Wireless sensor networks (WSNs) are made up of several sensors located in a specific area and powered by a finite amount of energy to gather environmental data. WSNs use sensor nodes (SNs) to collect and transmit data. However, the power supplied by the sensor network is restricted. Thus, SNs must store energy as often as to extend the lifespan of the network. In the proposed study, effective clustering and longer network lifetimes are achieved using multi-swarm optimization (MSO) and game theory based on locust search (LS-II). In this research, MSO is used to improve the… More >

Displaying 21-30 on page 3 of 212. Per Page