Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (11)
  • Open Access

    ARTICLE

    Machine-Learning Based Packet Switching Method for Providing Stable High-Quality Video Streaming in Multi-Stream Transmission

    Yumin Jo1, Jongho Paik2,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4153-4176, 2024, DOI:10.32604/cmc.2024.047046

    Abstract Broadcasting gateway equipment generally uses a method of simply switching to a spare input stream when a failure occurs in a main input stream. However, when the transmission environment is unstable, problems such as reduction in the lifespan of equipment due to frequent switching and interruption, delay, and stoppage of services may occur. Therefore, applying a machine learning (ML) method, which is possible to automatically judge and classify network-related service anomaly, and switch multi-input signals without dropping or changing signals by predicting or quickly determining the time of error occurrence for smooth stream switching when there are problems such as… More >

  • Open Access

    ARTICLE

    Visual News Ticker Surveillance Approach from Arabic Broadcast Streams

    Moeen Tayyab1, Ayyaz Hussain2,*, Usama Mir3, M. Aqeel Iqbal4, Muhammad Haneef5

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6177-6193, 2023, DOI:10.32604/cmc.2023.034669

    Abstract The news ticker is a common feature of many different news networks that display headlines and other information. News ticker recognition applications are highly valuable in e-business and news surveillance for media regulatory authorities. In this paper, we focus on the automatic Arabic Ticker Recognition system for the Al-Ekhbariya news channel. The primary emphasis of this research is on ticker recognition methods and storage schemes. To that end, the research is aimed at character-wise explicit segmentation using a semantic segmentation technique and words identification method. The proposed learning architecture considers the grouping of homogeneous-shaped classes. This incorporates linguistic taxonomy in… More >

  • Open Access

    ARTICLE

    Multivariate Broadcast Encryption with Group Key Algorithm for Secured IoT

    M. Suresh Kumar1,*, T. Purosothaman2

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 925-938, 2023, DOI:10.32604/csse.2023.027315

    Abstract The expanding and ubiquitous availability of the Internet of Things (IoT) have changed everyone’s life easier and more convenient. Same time it also offers a number of issues, such as effectiveness, security, and excessive power consumption, which constitute a danger to intelligent IoT-based apps. Group managing is primarily used for transmitting and multi-pathing communications that are secured with a general group key and it can only be decrypted by an authorized group member. A centralized trustworthy system, which is in charge of key distribution and upgrades, is used to maintain group keys. To provide longitudinal access controls, Software Defined Network… More >

  • Open Access

    ARTICLE

    A Robust Emergency Messages Routing Scheme for Urban VANETs

    Mumtaz Ali Shah1,2,*, Farrukh Zeeshan Khan1, Ghulam Abbas2

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2617-2632, 2022, DOI:10.32604/cmc.2022.025981

    Abstract Vehicular ad-hoc networks (VANETs) play an essential role in enhancing transport infrastructure by making vehicles intelligent and proficient in preventing traffic fatalities. Direction-based greedy protocols pick the next route vehicle for transmitting emergency messages (EMs) depending upon the present location of adjacent vehicles towards sink vehicles by using an optimal uni-directional road traffic approach. Nevertheless, such protocols suffer performance degradation by ignoring the moving directions of vehicles in bi-directional road traffic where topological changes happen continuously. Due to the high number of vehicles, it is essential to broadcast EMs to all vehicles to prevent traffic delays and collisions. A cluster-based… More >

  • Open Access

    ARTICLE

    A Broadcast Storm Detection and Treatment Method Based on Situational Awareness

    Zhe Zhu1, Mingjian Zhang2, Yong Liu1, Lan Ma1, Xin Liu1,*

    Journal of Information Hiding and Privacy Protection, Vol.3, No.1, pp. 47-54, 2021, DOI:10.32604/jihpp.2021.016690

    Abstract At present, the research of blockchain is very popular, but the practical application of blockchain is very few. The main reason is that the concurrency of blockchain is not enough to support application scenarios. After that, applications such as Intervalue increase the concurrency of blockchain transactions. However, due to the problems of network bandwidth and algorithm performance, there is always a broadcast storm, which affects the normal use of nodes in the whole network. However, the emergence of broadcast storms needs to rely on the node itself, which may be very slow. Even if developers debug the corresponding code, they… More >

  • Open Access

    ARTICLE

    Analytical Comparison of Resource Search Algorithms in Non-DHT Mobile Peer-to-Peer Networks

    Ajay Arunachalam1,*, Vinayakumar Ravi2, Moez Krichen3, Roobaea Alroobaea4, Jehad Saad Alqurni5

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 983-1001, 2021, DOI:10.32604/cmc.2021.015371

    Abstract One of the key challenges in ad-hoc networks is the resource discovery problem. How efficiently & quickly the queried resource/object can be resolved in such a highly dynamic self-evolving network is the underlying question? Broadcasting is a basic technique in the Mobile Ad-hoc Networks (MANETs), and it refers to sending a packet from one node to every other node within the transmission range. Flooding is a type of broadcast where the received packet is retransmitted once by every node. The naive flooding technique floods the network with query messages, while the random walk scheme operates by contacting subsets of each… More >

  • Open Access

    ARTICLE

    A Multi-Conditional Proxy Broadcast Re-Encryption Scheme for Sensor Networks

    Pang Li1, *, Lifeng Zhu2, Brij B. Gupta3, 4, Sunil Kumar Jha5

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2079-2090, 2020, DOI:10.32604/cmc.2020.013696

    Abstract In sensor networks, it is a challenge to ensure the security of data exchange between packet switching nodes holding different private keys. In order to solve this problem, the present study proposes a scheme called multi-conditional proxy broadcast reencryption (MC-PBRE). The scheme consists of the following roles: the source node, proxy server, and the target node. If the condition is met, the proxy can convert the encrypted data of the source node into data that the target node can directly decrypt. It allows the proxy server to convert the ciphertext of the source node to a new ciphertext of the… More >

  • Open Access

    ARTICLE

    Live broadcast of transcatheter PDA closure in a 700 grams ELBW infant during the International PDA Symposium

    Shyam Sathanandam, Ashley Gianinni, Eric Sefton, Kaitlyn Greer, Nathan Stecchi, Kimberly Allen, Ranjit Philip, B. Rush Waller

    Congenital Heart Disease, Vol.14, No.1, pp. 85-89, 2019, DOI:10.1111/chd.12710

    Abstract Objective: The objective of this article is to describe a live case transmission of tran‐ scatheter closure of a patent ductus arteriosus (PDA) in an extremely low birth weight (ELBW) infant during the first International PDA Symposium conducted in Memphis, Tennessee.
    Setting: A multidisciplinary team approach including audiovisual specialists, informa‐ tion technology specialists, physicians, nurses, and other health care specialists was required to perform the transcatheter PDA closure (TCPC) in an ELBW infant at LeBonheur Children’s Hospital and the procedure was broadcast live to the attend‐ ees at the International PDA Symposium allowing for a two‐way audiovisual discus‐ sion during… More >

  • Open Access

    ARTICLE

    The Quality Assessment of Non-Integer-Hour Data in GPS Broadcast Ephemerides and Its Impact on the Accuracy of Real-Time Kinematic Positioning Over the South China Sea

    Zhangzhen Sun1, Tianhe Xu1,*, Fan Gao1, Chunhua Jiang1, Guochang Xu1

    CMES-Computer Modeling in Engineering & Sciences, Vol.119, No.2, pp. 263-280, 2019, DOI:10.32604/cmes.2019.04425

    Abstract Abnormal effects in GPS broadcast ephemerides can have a significant effect on real-time navigation and positioning solutions that use the orbit and clock error data provided by GPS broadcast ephemerides. This paper describes three types of non-integer-hour navigation data in GPS broadcast ephemeris data. Compared with GPST integer hour data, we find that there are two types of data blocks for non-integer-hour navigation containing gross errors with different levels of precision, which is reflected in the user range accuracy (URA) of the broadcast ephemeris. These gross errors can cause large deviations when using the GPS broadcast ephemeris for orbit calculation… More >

  • Open Access

    ARTICLE

    Preservation Mechanism of Network Electronic Records Based on Broadcast-Storage Network in Urban Construction

    Fujian Zhu1,2, Yongjun Ren1,2,*, Qirun Wang3,4, Jinyue Xia5

    Journal of New Media, Vol.1, No.1, pp. 27-34, 2019, DOI:10.32604/jnm.2019.05920

    Abstract With the wide application of information technology in urban infrastructure, urban construction has entered the stage of smart city, forming a large number of network electronic records. These electronic records play a vital role in the maintenance of urban infrastructure. However, how to preserve the network electronic records in the field of urban construction is still lack of a comprehensive and serious study. Aiming at this problem, the paper proposes to use the technology of broadcast-storage network to preserve the network electronic records for a long time and gives the concrete preservation process. More >

Displaying 1-10 on page 1 of 11. Per Page