Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (69)
  • Open Access

    ARTICLE

    Chaotic Krill Herd with Fuzzy Based Routing Protocol for Wireless Networks

    Ashit Kumar Dutta1,*, Yasser Albagory2, Farhan M. Obesat3, Anas Waleed Abulfaraj4

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1659-1674, 2022, DOI:10.32604/iasc.2022.026263

    Abstract Energy is considered a valuable source in wireless sensor networks (WSN) for effectively improving the survivability of the network. The non-uniform dispersion of load in the network causes unbalanced energy dissipation which can result in network interruption. The route selection process can be considered as an optimization problem and is solved by utilize of artificial intelligence (AI) techniques. This study introduces an energy efficient chaotic krill herd algorithm with adaptive neuro fuzzy inference system based routing (EECKHA-ANFIS) protocol for WSN. The goal of the EECKHA-ANFIS method is for deriving a better set of routes to destination in such a way… More >

  • Open Access

    ARTICLE

    Optimal Beamforming for Secure Transmit in Practical Wireless Networks

    Qiuqin Yang1, Linfang Li1, Ming-Xing Luo1,*, Xiaojun Wang2

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1863-1877, 2022, DOI:10.32604/cmc.2022.027120

    Abstract In real communication systems, secure and low-energy transmit scheme is very important. So far, most of schemes focus on secure transmit in special scenarios. In this paper, our goal is to propose a secure protocol in wireless networks involved various factors including artificial noise (AN), the imperfect receiver and imperfect channel state information (CSI) of eavesdropper, weight of beamforming (BF) vector, cooperative jammers (CJ), multiple receivers, and multiple eavesdroppers, and the analysis shows that the protocol can reduce the transmission power, and at the same time the safe reachability rate is greater than our pre-defined value, and the analysis results… More >

  • Open Access

    ARTICLE

    Quantum Artificial Intelligence Based Node Localization Technique for Wireless Networks

    Hanan Abdullah Mengash1, Radwa Marzouk1, Siwar Ben Haj Hassine2, Anwer Mustafa Hilal3,*, Ishfaq Yaseen3, Abdelwahed Motwakel3

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 327-342, 2022, DOI:10.32604/cmc.2022.026464

    Abstract Artificial intelligence (AI) techniques have received significant attention among research communities in the field of networking, image processing, natural language processing, robotics, etc. At the same time, a major problem in wireless sensor networks (WSN) is node localization, which aims to identify the exact position of the sensor nodes (SN) using the known position of several anchor nodes. WSN comprises a massive number of SNs and records the position of the nodes, which becomes a tedious process. Besides, the SNs might be subjected to node mobility and the position alters with time. So, a precise node localization (NL) manner is… More >

  • Open Access

    ARTICLE

    Analyzing and Enabling the Harmonious Coexistence of Heterogeneous Industrial Wireless Networks

    Bilal Khan1, Danish Shehzad1, Numan Shafi1, Ga-Young Kim2,*, Muhammad Umar Aftab1

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1671-1690, 2022, DOI:10.32604/cmc.2022.024918

    Abstract Nowadays multiple wireless communication systems operate in industrial environments side by side. In such an environment performance of one wireless network can be degraded by the collocated hostile wireless network having higher transmission power or higher carrier sensing threshold. Unlike the previous research works which considered IEEE 802.15.4 for the Industrial Wireless communication systems (iWCS) this paper examines the coexistence of IEEE 802.11 based iWCS used for delay-stringent communication in process automation and gWLAN (general-purpose WLAN) used for non-real time communication. In this paper, we present a Markov chain-based performance model that described the transmission failure of iWCS due to… More >

  • Open Access

    ARTICLE

    Improving Throughput of Transmission Control Protocol Using Cross Layer Approach

    Jansi Rani Sella Veluswami*

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1231-1239, 2022, DOI:10.32604/csse.2022.020230

    Abstract Most of the internet users connect through wireless networks. Major part of internet traffic is carried by Transmission Control Protocol (TCP). It has some design constraints while operated across wireless networks. TCP is the traditional predominant protocol designed for wired networks. To control congestion in the network, TCP used acknowledgment to delivery of packets by the end host. In wired network, packet loss signals congestion in the network. But rather in wireless networks, loss is mainly because of the wireless characteristics such as fading, signal strength etc. When a packet travels across wired and wireless networks, TCP congestion control theory… More >

  • Open Access

    ARTICLE

    Power Allocation in NOMA-CR for 5G Enabled IoT Networks

    Mohammed Basheri1, Mohammad Haseeb Zafar1,2,3,*, Imran Khan3

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5515-5530, 2022, DOI:10.32604/cmc.2022.027532

    Abstract In the power domain, non-orthogonal multiple access (NOMA) supports multiple users on the same time-frequency resources, assigns different transmission powers to different users, and differentiates users by user channel gains. Multi-user signals are superimposed and transmitted in the power domain at the transmitting end by actively implementing controllable interference information, and multi-user detection algorithms, such as successive interference cancellation (SIC) is performed at the receiving end to demodulate the necessary user signals. In contrast to the orthogonal transmission method, the non-orthogonal method can achieve higher spectrum utilization. However, it will increase the receiver complexity. With the development of microelectronics technology,… More >

  • Open Access

    ARTICLE

    Enhance Vertical Handover Security During Execution Phase in Mobile Networks

    Omar Khattab*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3863-3875, 2022, DOI:10.32604/cmc.2022.026102

    Abstract The Vertical Handover (VHO) is one of the most vital features provided for the heterogeneous mobile networks. It allows Mobile Users (MUs) to keep ongoing sessions without disruption while they continuously move between different Radio Access Technologies (RATs) such as Wireless Fidelity (Wi-Fi), Global System for Mobile Communication (GSM), Universal Mobile Telecommunications System (UMTS), Long Term Evolution (LTE) and Fifth Generation (5G). In order to fulfill this goal, the VHO must comply to three main phases: starting of collecting the required information and then passing it for decision phase to obtain the best available RAT for performing VHO by execution… More >

  • Open Access

    ARTICLE

    Feedline Separation for Independent Control of Simultaneously Different Tx/Rx Radiation Patterns

    Akarachai Inthanil, Monthippa Uthansakul*, Peerapong Uthansakul

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2221-2241, 2022, DOI:10.32604/cmc.2022.024390

    Abstract The shortcoming of Wi-Fi networks is that one user can access the router at a time. This drawback limits the system throughput and delay. This paper proposes a concept of Simultaneously Different Tx/Rx (SDTR) radiation patterns with only one antenna set at the router. Furthermore, these two patterns have to be simultaneously operated at the same time so that the system delay can be eased. An omni-directional pattern is employed at router for receiving mode so that the router can sense carrier signal from all directions. At the same time, the router launches a directional beam pointed to another user.… More >

  • Open Access

    ARTICLE

    Enhanced Route Optimization for Wireless Networks Using Meta-Heuristic Engineering

    S. Navaneetha Krishnan1, P. Sundara Vadivel2,*, D. Yuvaraj3, T. Satyanarayana Murthy4, Sree Jagadeesh Malla5, S. Nachiyappan6, S. Shanmuga Priya7

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 17-26, 2022, DOI:10.32604/csse.2022.021590

    Abstract Wireless Sensor Networks (WSN) are commonly used to observe and monitor precise environments. WSNs consist of a large number of inexpensive sensor nodes that have been separated and distributed in different environments. The base station received the amount of data collected by the numerous sensors. The current developments designate that the attentFgion in applications of WSNs has been increased and extended to a very large scale. The Trust-Based Adaptive Acknowledgement (TRAACK) Intrusion-Detection System for Wireless Sensor Networks (WSN) is described based on the number of active positive deliveries and The Kalman filter used in Modified Particle Swarm Optimization (MPSO) has… More >

  • Open Access

    ARTICLE

    Efficiency Effect of Obstacle Margin on Line-of-Sight in Wireless Networks

    Murad A. A. Almekhlafi1, Taiseer Abdalla Elfadil Eisa2, Fahd N. Al-Wesabi3,4, Abdelzahir Abdelmaboud5, Manar Ahmed Hamza6,*, Abdelwahed Motwakel6, Ishfaq Yaseen6, Mohammed Rizwanullah6

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 227-242, 2022, DOI:10.32604/cmc.2022.024356

    Abstract Line-of-sight clarity and assurance are essential because they are considered the golden rule in wireless network planning, allowing the direct propagation path to connect the transmitter and receiver and retain the strength of the signal to be received. Despite the increasing literature on the line of sight with different scenarios, no comprehensive study focuses on the multiplicity of parameters and basic concepts that must be taken into account when studying such a topic as it affects the results and their accuracy. Therefore, this research aims to find limited values that ensure that the signal reaches the future efficiently and enhances… More >

Displaying 21-30 on page 3 of 69. Per Page