Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (208)
  • Open Access

    ARTICLE

    Trusted Cluster-Based Communication for Wireless Sensor Network Using Meta-Heuristic Algorithms

    Pankaj Kumar Sharma1,*, Uma Shankar Modani2

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1935-1951, 2023, DOI:10.32604/csse.2023.031509

    Abstract The mobile transient and sensor network’s routing algorithm detects available multi-hop paths between source and destination nodes. However, some methods are not as reliable or trustworthy as expected. Therefore, finding a reliable method is an important factor in improving communication security. For further enhancement of protected communication, we suggest a trust cluster based secure routing (TCSR) framework for wireless sensor network (WSN) using optimization algorithms. First, we introduce an efficient cluster formation using a modified tug of war optimization (MTWO) algorithm, which provides load-balanced clusters for energy-efficient data transmission. Second, we illustrate the optimal head selection using multiple design constraints… More >

  • Open Access

    ARTICLE

    Energy-Efficient Routing Using Novel Optimization with Tabu Techniques for Wireless Sensor Network

    Manar Ahmed Hamza1,2,*, Aisha Hassan Abdalla Hashim1, Dalia H. Elkamchouchi3, Nadhem Nemri4, Jaber S. Alzahrani5, Amira Sayed A. Aziz6, Mnahel Ahmed Ibrahim7, Abdelwahed Motwakel2

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1711-1726, 2023, DOI:10.32604/csse.2023.031467

    Abstract Wireless Sensor Network (WSN) consists of a group of limited energy source sensors that are installed in a particular region to collect data from the environment. Designing the energy-efficient data collection methods in large-scale wireless sensor networks is considered to be a difficult area in the research. Sensor node clustering is a popular approach for WSN. Moreover, the sensor nodes are grouped to form clusters in a cluster-based WSN environment. The battery performance of the sensor nodes is likewise constrained. As a result, the energy efficiency of WSNs is critical. In specific, the energy usage is influenced by the loads… More >

  • Open Access

    ARTICLE

    DERNNet: Dual Encoding Recurrent Neural Network Based Secure Optimal Routing in WSN

    A. Venkatesh1, S. Asha2,*

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1375-1392, 2023, DOI:10.32604/csse.2023.030944

    Abstract A Wireless Sensor Network (WSN) is constructed with numerous sensors over geographical regions. The basic challenge experienced while designing WSN is in increasing the network lifetime and use of low energy. As sensor nodes are resource constrained in nature, novel techniques are essential to improve lifetime of nodes in WSN. Nodes energy is considered as an important resource for sensor node which are battery powered based. In WSN, energy is consumed mainly while data is being transferred among nodes in the network. Several research works are carried out focusing on preserving energy of nodes in the network and made network… More >

  • Open Access

    ARTICLE

    Differential Evolution with Arithmetic Optimization Algorithm Enabled Multi-Hop Routing Protocol

    Manar Ahmed Hamza1,*, Haya Mesfer Alshahrani2, Sami Dhahbi3, Mohamed K Nour4, Mesfer Al Duhayyim5, ElSayed M. Tag El Din6, Ishfaq Yaseen1, Abdelwahed Motwakel1

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1759-1773, 2023, DOI:10.32604/csse.2023.030581

    Abstract Wireless Sensor Networks (WSN) has evolved into a key technology for ubiquitous living and the domain of interest has remained active in research owing to its extensive range of applications. In spite of this, it is challenging to design energy-efficient WSN. The routing approaches are leveraged to reduce the utilization of energy and prolonging the lifespan of network. In order to solve the restricted energy problem, it is essential to reduce the energy utilization of data, transmitted from the routing protocol and improve network development. In this background, the current study proposes a novel Differential Evolution with Arithmetic Optimization Algorithm… More >

  • Open Access

    ARTICLE

    Internet of Things Enabled Energy Aware Metaheuristic Clustering for Real Time Disaster Management

    Riya Kumarasamy Santhanaraj1, Surendran Rajendran2,*, Carlos Andres Tavera Romero3, Sadish Sendil Murugaraj4

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1561-1576, 2023, DOI:10.32604/csse.2023.029463

    Abstract Wireless Sensor Networks (WSNs) are a major element of Internet of Things (IoT) networks which offer seamless sensing and wireless connectivity. Disaster management in smart cities can be considered as a safety critical application. Therefore, it becomes essential in ensuring network accessibility by improving the lifetime of IoT assisted WSN. Clustering and multihop routing are considered beneficial solutions to accomplish energy efficiency in IoT networks. This article designs an IoT enabled energy aware metaheuristic clustering with routing protocol for real time disaster management (EAMCR-RTDM). The proposed EAMCR-RTDM technique mainly intends to manage the energy utilization of nodes with the consideration… More >

  • Open Access

    ARTICLE

    Experimental Study of Moso Bamboo to-Steel Connections with Embedded Grouting Materials

    Shidong Nie1,2, Wei Fu1,2, Hui Wang1,2,*, Di Wu1,2,3, Min Liu1,2, Junlong Wang4

    Journal of Renewable Materials, Vol.11, No.3, pp. 1401-1423, 2023, DOI:10.32604/jrm.2022.023446

    Abstract Moso bamboos have attracted excessive attention as a renewable green building material to the concept of sustainable development. In this paper, the 20 bolted Moso bamboo connection specimens with embedded steel plates and grouting materials were designed according to connection configurations with different bolt diameters and end distance of bolt holes, and their bearing capacities and failure modes were analyzed by static tension tests. According to the test results of all connectors, the failure modes of the specimens are divided into four categories, and the effects of bolt diameter and bolt hole end distance on the connection bearing capacity and… More >

  • Open Access

    ARTICLE

    Efficient Origin-Destination Estimation Using Microscopic Traffic Simulation with Restricted Rerouting

    Kazuki Abe1,*, Hideki Fujii2, Shinobu Yoshimura2

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.2, pp. 1091-1109, 2023, DOI:10.32604/cmes.2022.021376

    Abstract Traffic simulators are utilized to solve a variety of traffic-related problems. For such simulators, origin-destination (OD) traffic volumes as mobility demands are required to input, and we need to estimate them. The authors regard an OD estimation as a bi-level programming problem, and apply a microscopic traffic simulation model to it. However, the simulation trials can be computationally expensive if full dynamic rerouting is allowed, when employing multi-agent-based models in the estimation process. This paper proposes an efficient OD estimation method using a multi-agent-based simulator with restricted dynamic rerouting to reduce the computational load. Even though, in the case of… More >

  • Open Access

    ARTICLE

    Region Centric GL Feature Approximation Based Secure Routing for Improved QoS in MANET

    S. Soundararajan1, R. Prabha2, M. Baskar3,*, T. J. Nagalakshmi4

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 267-280, 2023, DOI:10.32604/iasc.2023.032239

    Abstract Secure routing in Mobile Adhoc Network (Manet) is the key issue now a day in providing secure access to different network services. As mobile devices are used in accessing different services, performing secure routing becomes a challenging task. Towards this, different approaches exist which find the trusted route based on their previous transmission details and behavior of different nodes. Also, the methods focused on trust measurement based on tiny information obtained from local nodes or with global information which are incomplete. However, the adversary nodes are more capable and participate in each transmission not just to steal the data also… More >

  • Open Access

    ARTICLE

    Cluster Head Selection and Multipath Routing Based Energy Efficient Wireless Sensor Network

    T. Shanmugapriya1,*, Dr. K. Kousalya2

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 879-894, 2023, DOI:10.32604/iasc.2023.032074

    Abstract The Wireless Sensor Network (WSN) is a network of Sensor Nodes (SN) which adopt radio signals for communication amongst themselves. There is an increase in the prominence of WSN adaptability to emerging applications like the Internet of Things (IoT) and Cyber-Physical Systems (CPS). Data security, detection of faults, management of energy, collection and distribution of data, network protocol, network coverage, mobility of nodes, and network heterogeneity are some of the issues confronted by WSNs. There is not much published information on issues related to node mobility and management of energy at the time of aggregation of data. Towards the goal… More >

  • Open Access

    ARTICLE

    Combined Linear Multi-Model for Reliable Route Recommender in Next Generation Network

    S. Kalavathi1,*, R. Nedunchelian2

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 39-56, 2023, DOI:10.32604/iasc.2023.031522

    Abstract Network analysis is a promising field in the area of network applications as different types of traffic grow enormously and exponentially. Reliable route prediction is a challenging task in the Large Scale Networks (LSN). Various non-self-learning and self-learning approaches have been adopted to predict reliable routing. Routing protocols decide how to send all the packets from source to the destination addresses across the network through their IP. In the current era, dynamic protocols are preferred as they network self-learning internally using an algorithm and may not entail being updated physically more than the static protocols. A novel method named Reliable… More >

Displaying 41-50 on page 5 of 208. Per Page