Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (334)
  • Open Access

    COMMENTARY

    GlycoRNA: A new player in cellular communication

    HYUNG SEOK KIM*

    Oncology Research, Vol.33, No.5, pp. 995-1000, 2025, DOI:10.32604/or.2025.060616 - 18 April 2025

    Abstract The discovery of glycosylated RNA molecules, known as glycoRNAs, introduces a novel dimension to cellular biology. This commentary explores the transformative findings surrounding glycoRNAs, emphasizing their unique roles in cancer progression and the therapeutic opportunities they present. GlycoRNAs, through interactions with lectins and immune receptors, may contribute to tumor immune evasion. Moreover, the therapeutic potential of this emerging knowledge includes interventions targeting glycoRNA synthesis and modulation of associated signaling pathways. By highlighting these critical insights, this commentary aims to encourage the development of innovative strategies that could improve cancer prognosis and treatment. More >

  • Open Access

    ARTICLE

    Entropy-Bottleneck-Based Privacy Protection Mechanism for Semantic Communication

    Kaiyang Han1, Xiaoqiang Jia1, Yangfei Lin2, Tsutomu Yoshinaga2, Yalong Li2, Jiale Wu2,*

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2971-2988, 2025, DOI:10.32604/cmc.2025.061563 - 16 April 2025

    Abstract With the rapid development of artificial intelligence and the Internet of Things, along with the growing demand for privacy-preserving transmission, the need for efficient and secure communication systems has become increasingly urgent. Traditional communication methods transmit data at the bit level without considering its semantic significance, leading to redundant transmission overhead and reduced efficiency. Semantic communication addresses this issue by extracting and transmitting only the most meaningful semantic information, thereby improving bandwidth efficiency. However, despite reducing the volume of data, it remains vulnerable to privacy risks, as semantic features may still expose sensitive information. To… More >

  • Open Access

    ARTICLE

    Computational Optimization of RIS-Enhanced Backscatter and Direct Communication for 6G IoT: A DDPG-Based Approach with Physical Layer Security

    Syed Zain Ul Abideen1, Mian Muhammad Kamal2,*, Eaman Alharbi3, Ashfaq Ahmad Malik4, Wadee Alhalabi5, Muhammad Shahid Anwar6,*, Liaqat Ali7

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.3, pp. 2191-2210, 2025, DOI:10.32604/cmes.2025.061744 - 03 March 2025

    Abstract The rapid evolution of wireless technologies and the advent of 6G networks present new challenges and opportunities for Internet of Things (IoT) applications, particularly in terms of ultra-reliable, secure, and energy-efficient communication. This study explores the integration of Reconfigurable Intelligent Surfaces (RIS) into IoT networks to enhance communication performance. Unlike traditional passive reflector-based approaches, RIS is leveraged as an active optimization tool to improve both backscatter and direct communication modes, addressing critical IoT challenges such as energy efficiency, limited communication range, and double-fading effects in backscatter communication. We propose a novel computational framework that combines… More >

  • Open Access

    REVIEW

    On Optimizing Resource Allocation: A Comparative Review of Resource Allocation Strategies in HetNets

    Jeta Dobruna1,2, Zana Limani Fazliu2,*, Iztok Humar1, Mojca Volk1

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.3, pp. 2211-2245, 2025, DOI:10.32604/cmes.2025.059541 - 03 March 2025

    Abstract Resource allocation remains a challenging issue in communication networks, and its complexity is continuously increasing with the densification of the networks. With the evolution of new wireless technologies such as Fifth Generation (5G) and Sixth Generation (6G) mobile networks, the service level requirements have become stricter and more heterogeneous depending on the use case. In this paper, we review a large body of literature on various resource allocation schemes that are used in particular in mobile wireless communication networks and compare the proposed schemes in terms of performance indicators as well as techniques used. Our… More >

  • Open Access

    ARTICLE

    HybridEdge: A Lightweight and Secure Hybrid Communication Protocol for the Edge-Enabled Internet of Things

    Amjad Khan1, Rahim Khan1,*, Fahad Alturise2,*, Tamim Alkhalifah3

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 3161-3178, 2025, DOI:10.32604/cmc.2025.060372 - 17 February 2025

    Abstract The Internet of Things (IoT) and edge-assisted networking infrastructures are capable of bringing data processing and accessibility services locally at the respective edge rather than at a centralized module. These infrastructures are very effective in providing a fast response to the respective queries of the requesting modules, but their distributed nature has introduced other problems such as security and privacy. To address these problems, various security-assisted communication mechanisms have been developed to safeguard every active module, i.e., devices and edges, from every possible vulnerability in the IoT. However, these methodologies have neglected one of the… More >

  • Open Access

    ARTICLE

    Enhancing User Experience in AI-Powered Human-Computer Communication with Vocal Emotions Identification Using a Novel Deep Learning Method

    Ahmed Alhussen1, Arshiya Sajid Ansari2,*, Mohammad Sajid Mohammadi3

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 2909-2929, 2025, DOI:10.32604/cmc.2024.059382 - 17 February 2025

    Abstract Voice, motion, and mimicry are naturalistic control modalities that have replaced text or display-driven control in human-computer communication (HCC). Specifically, the vocals contain a lot of knowledge, revealing details about the speaker’s goals and desires, as well as their internal condition. Certain vocal characteristics reveal the speaker’s mood, intention, and motivation, while word study assists the speaker’s demand to be understood. Voice emotion recognition has become an essential component of modern HCC networks. Integrating findings from the various disciplines involved in identifying vocal emotions is also challenging. Many sound analysis techniques were developed in the… More >

  • Open Access

    ARTICLE

    End-To-End Encryption Enabled Lightweight Mutual Authentication Scheme for Resource Constrained IoT Network

    Shafi Ullah1,*, Haidawati Muhammad Nasir2, Kushsairy Kadir3,*, Akbar Khan1, Ahsanullah Memon4, Shanila Azhar1, Ilyas Khan5, Muhammad Ashraf1

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 3223-3249, 2025, DOI:10.32604/cmc.2024.054676 - 17 February 2025

    Abstract Machine-to-machine (M2M) communication networks consist of resource-constrained autonomous devices, also known as autonomous Internet of things (IoTs) or machine-type communication devices (MTCDs) which act as a backbone for Industrial IoT, smart cities, and other autonomous systems. Due to the limited computing and memory capacity, these devices cannot maintain strong security if conventional security methods are applied such as heavy encryption. This article proposed a novel lightweight mutual authentication scheme including elliptic curve cryptography (ECC) driven end-to-end encryption through curve25519 such as (i): efficient end-to-end encrypted communication with pre-calculation strategy using curve25519; and (ii): elliptic curve More >

  • Open Access

    ARTICLE

    Hybrid DF and SIR Forwarding Strategy in Conventional and Distributed Alamouti Space-Time Coded Cooperative Networks

    Slim Chaoui1,*, Omar Alruwaili1, Faeiz Alserhani1, Haifa Harrouch2

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.2, pp. 1933-1954, 2025, DOI:10.32604/cmes.2025.059346 - 27 January 2025

    Abstract In this paper, we propose a hybrid decode-and-forward and soft information relaying (HDFSIR) strategy to mitigate error propagation in coded cooperative communications. In the HDFSIR approach, the relay operates in decode-and-forward (DF) mode when it successfully decodes the received message; otherwise, it switches to soft information relaying (SIR) mode. The benefits of the DF and SIR forwarding strategies are combined to achieve better performance than deploying the DF or SIR strategy alone. Closed-form expressions for the outage probability and symbol error rate (SER) are derived for coded cooperative communication with HDFSIR and energy-harvesting relays. Additionally,… More >

  • Open Access

    ARTICLE

    Enhancing Vehicle Overtaking System via LoRa-Enabled Vehicular Communication Approach

    Kwang Chee Seng, Siti Fatimah Abdul Razak*, Sumendra Yogarayan

    Computer Systems Science and Engineering, Vol.49, pp. 239-258, 2025, DOI:10.32604/csse.2024.056582 - 10 January 2025

    Abstract Vehicle overtaking poses significant risks and leads to injuries and losses on Malaysia’s roads. In most scenarios, insufficient and untimely information available to drivers for accessing road conditions and their surrounding environment is the primary factor that causes these incidents. To address these issues, a comprehensive system is required to provide real-time assistance to drivers. Building upon our previous research on a LoRa-based lane change decision-aid system, this study proposes an enhanced Vehicle Overtaking System (VOS). This system utilizes long-range (LoRa) communication for reliable real-time data exchange between vehicles (V2V) and the cloud (V2C). By More >

  • Open Access

    ARTICLE

    Secure Channel Estimation Using Norm Estimation Model for 5G Next Generation Wireless Networks

    Khalil Ullah1,*, Song Jian1, Muhammad Naeem Ul Hassan1, Suliman Khan2, Mohammad Babar3,*, Arshad Ahmad4, Shafiq Ahmad5

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1151-1169, 2025, DOI:10.32604/cmc.2024.057328 - 03 January 2025

    Abstract The emergence of next generation networks (NextG), including 5G and beyond, is reshaping the technological landscape of cellular and mobile networks. These networks are sufficiently scaled to interconnect billions of users and devices. Researchers in academia and industry are focusing on technological advancements to achieve high-speed transmission, cell planning, and latency reduction to facilitate emerging applications such as virtual reality, the metaverse, smart cities, smart health, and autonomous vehicles. NextG continuously improves its network functionality to support these applications. Multiple input multiple output (MIMO) technology offers spectral efficiency, dependability, and overall performance in conjunction with More >

Displaying 1-10 on page 1 of 334. Per Page