Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (58)
  • Open Access

    ARTICLE

    Embedded Coded Relay System for Molecular Communications

    Eman S. Attia1, Ashraf A. M. Khalaf1, Fathi E. Abd El-Samie2, Saied M. Abd El-atty2, Konstantinos A. Lizos3, Osama Alfarraj4, Farid Shawki2, Imran Khan5, Ki-Il Kim6,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2729-2748, 2022, DOI:10.32604/cmc.2022.026197

    Abstract With the emergence of the COVID-19 pandemic, the World Health Organization (WHO) has urged scientists and industrialists to explore modern information and communication technology (ICT) as a means to reduce or even eliminate it. The World Health Organization recently reported that the virus may infect the organism through any organ in the living body, such as the respiratory, the immunity, the nervous, the digestive, or the cardiovascular system. Targeting the abovementioned goal, we envision an implanted nanosystem embedded in the intra living-body network. The main function of the nanosystem is either to perform diagnosis and mitigation of infectious diseases or… More >

  • Open Access

    ARTICLE

    Secret Key Optimization for Secure Speech Communications

    Osama S. Faragallah1,*, Mahmoud Farouk2, Hala S. El-Sayed3

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3025-3037, 2022, DOI:10.32604/cmc.2022.019951

    Abstract This paper answers three essential questions for audio speech cryptosystems in time and discrete transform domains. The first question is, what are the best values of sub-keys that must be used to get the best quality and security for the audio cryptosystem in time and discrete transform domains. The second question is the relation between the number of sub-keys, the number of secret keys used, and the audio speech signal block’s size. Finally, how many possible secret keys can be used to get the best quality and security results for the audio speech cryptosystem in time and discrete transform domains.… More >

  • Open Access

    ARTICLE

    Novel Design of UWB Jeans Based Textile Antenna for Body-Centric Communications

    Mohammad Monirujjaman Khan1,*, Bright Yeboah-Akowuah2, Kaisarul Islam1, Eric Tutu Tchao2, Sumanta Bhattacharyya3, Rajesh Dey4, Mehedi Masud5, Fahad Alraddady6

    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1079-1093, 2022, DOI:10.32604/csse.2022.022313

    Abstract This research presents an ultra-wideband (UWB) textile antenna design for body-centric applications. The antenna is printed on a 1 mm thick denim substrate with a 1.7 relative permittivity. The jeans substrate is sandwiched between a partial ground plane and a radiating patch with a Q-shaped slot. The slotted radiating patch is placed above the substrate and measures 27.8 mm × 23.8 mm. In free space, the antenna covers the ultra-wideband spectrum designated by the Federal Communication Commission (FCC). Various parameters of the antenna design were changed for further performance evaluation. Depending on the operating frequency, the antenna's realized gain varied from 2.7 to 5 dB. The… More >

  • Open Access

    ARTICLE

    Robust Authentication and Session Key Agreement Protocol for Satellite Communications

    Somayeh Soltani1, Seyed Amin Hosseini Seno1, Juli Rejito2, Rahmat Budiarto3,*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5891-5910, 2022, DOI:10.32604/cmc.2022.023697

    Abstract Satellite networks are recognized as the most essential communication infrastructures in the world today, which complement land networks and provide valuable services for their users. Extensive coverage and service stability of these networks have increased their popularity. Since eavesdropping and active intrusion in satellite communications are much easier than in terrestrial networks, securing satellite communications is vital. So far, several protocols have been proposed for authentication and key exchange of satellite communications, but none of them fully meet the security requirements. In this paper, we examine one of these protocols and identify its security vulnerabilities. Moreover, we propose a robust… More >

  • Open Access

    REVIEW

    Milestones of Wireless Communication Networks and Technology Prospect of Next Generation (6G)

    Mohammed H. Alsharif1, Md. Sanwar Hossain2, Abu Jahid3, Muhammad Asghar Khan4, Bong Jun Choi5,*, Samih M. Mostafa6,7

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4803-4818, 2022, DOI:10.32604/cmc.2022.023500

    Abstract Since around 1980, a new generation of wireless technology has arisen approximately every 10 years. First-generation (1G) and second-generation (2G) began with voice and eventually introduced more and more data in third-generation (3G) and became highly popular in the fourth-generation (4G). To increase the data rate along with low latency and mass connectivity the fifth-generation (5G) networks are being installed from 2020. However, the 5G technology will not be able to fulfill the data demand at the end of this decade. Therefore, it is expected that 6G communication networks will rise, providing better services through the implementation of new enabling… More >

  • Open Access

    ARTICLE

    Optimizing Energy Conservation in V2X Communications for 5G Networks

    Arif Husen1,2, Abid Soahil1,*, Mohammad Hijji2, Muhammad Hasanain Chaudary1, Farooq Ahmed1

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3479-3495, 2022, DOI:10.32604/cmc.2022.023840

    Abstract The smart vehicles are one of critical enablers for automated services in smart cities to provide intelligent transportation means without human intervention. In order to fulfil requirements, Vehicle-to-Anything(V2X) communications aims to manage massive connectivity and high traffic load on base stations and extend the range over multiple hops in 5G networks. However, V2X networking faces several challenges from dynamic topology caused by high velocity of nodes and routing overhead that degrades the network performance and increases energy consumption. The existing routing scheme for V2X networking lacks energy efficiency and scalability for high velocity nodes with dense distribution. In order to… More >

  • Open Access

    ARTICLE

    Multi-Agent Deep Q-Networks for Efficient Edge Federated Learning Communications in Software-Defined IoT

    Prohim Tam1, Sa Math1, Ahyoung Lee2, Seokhoon Kim1,3,*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3319-3335, 2022, DOI:10.32604/cmc.2022.023215

    Abstract Federated learning (FL) activates distributed on-device computation techniques to model a better algorithm performance with the interaction of local model updates and global model distributions in aggregation averaging processes. However, in large-scale heterogeneous Internet of Things (IoT) cellular networks, massive multi-dimensional model update iterations and resource-constrained computation are challenging aspects to be tackled significantly. This paper introduces the system model of converging software-defined networking (SDN) and network functions virtualization (NFV) to enable device/resource abstractions and provide NFV-enabled edge FL (eFL) aggregation servers for advancing automation and controllability. Multi-agent deep Q-networks (MADQNs) target to enforce a self-learning softwarization, optimize resource allocation… More >

  • Open Access

    ARTICLE

    Analysis and Modeling of Propagation in Tunnel at 3.7 and 28 GHz

    Md Abdus Samad1,2, Dong-You Choi1,*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3127-3143, 2022, DOI:10.32604/cmc.2022.023086

    Abstract In present-day society, train tunnels are extensively used as a means of transportation. Therefore, to ensure safety, streamlined train operations, and uninterrupted internet access inside train tunnels, reliable wave propagation modeling is required. We have experimented and measured wave propagation models in a 1674 m long straight train tunnel in South Korea. The measured path loss and the received signal strength were modeled with the Close-In (CI), Floating intercept (FI), CI model with a frequency-weighted path loss exponent (CIF), and alpha-beta-gamma (ABG) models, where the model parameters were determined using minimum mean square error (MMSE) methods. The measured and the… More >

  • Open Access

    ARTICLE

    Proposed Different Signal Processing Tools for Efficient Optical Wireless Communications

    Hend Ibrahim1, Abeer D. Algarni2,*, Mahmoud Abdalla1, Walid El-Shafai3,4, Fathi E. Abd El-Samie2,3, Naglaa F. Soliman1,2

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3293-3318, 2022, DOI:10.32604/cmc.2022.022436

    Abstract Optical Wireless Communication (OWC) is a new trend in communication systems to achieve large bandwidth, high bit rate, high security, fast deployment, and low cost. The basic idea of the OWC is to transmit data on unguided media with light. This system requires multi-carrier modulation such as Orthogonal Frequency Division Multiplexing (OFDM). This paper studies optical OFDM performance based on Intensity Modulation with Direct Detection (IM/DD) system. This system requires a non-negativity constraint. The paper presents a framework for wireless optical OFDM system that comprises (IM/DD) with different forms, Direct Current biased Optical OFDM (DCO-OFDM), Asymmetrically Clipped Optical OFDM (ACO-OFDM),… More >

  • Open Access

    ARTICLE

    Optimization Analysis of Sustainable Solar Power System for Mobile Communication Systems

    Mohammed H. Alsharif1, Raju Kannadasan2, Amir Y. Hassan3, Wael Z. Tawfik4, Mun-Kyeom Kim5,*, Muhammad Asghar Khan6, Ahmad A. A. Solyman7

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3243-3255, 2022, DOI:10.32604/cmc.2022.022348

    Abstract Cellular mobile technology has witnessed tremendous growth in recent times. One of the challenges facing the operators to extend the coverage of the networks to meet the rising demand for cellular mobile services is the power sources used to supply cellular towers with energy, especially in remote. Thus, switch from the conventional sources of energy to a greener and sustainable power model became a target of the academic and industrial sectors in many fields; one of these important fields is the telecommunication sector. Accordingly, this study aims to find the optimum sizing and techno-economic investigation of a solar photovoltaic scheme… More >

Displaying 21-30 on page 3 of 58. Per Page