Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (38)
  • Open Access

    ARTICLE

    Smart Grid Security Framework for Data Transmissions with Adaptive Practices Using Machine Learning Algorithm

    Shitharth Selvarajan1,2,3,*, Hariprasath Manoharan4, Taher Al-Shehari5, Hussain Alsalman6, Taha Alfakih7

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4339-4369, 2025, DOI:10.32604/cmc.2025.056100 - 06 March 2025

    Abstract This research presents an analysis of smart grid units to enhance connected units’ security during data transmissions. The major advantage of the proposed method is that the system model encompasses multiple aspects such as network flow monitoring, data expansion, control association, throughput, and losses. In addition, all the above-mentioned aspects are carried out with neural networks and adaptive optimizations to enhance the operation of smart grid networks. Moreover, the quantitative analysis of the optimization algorithm is discussed concerning two case studies, thereby achieving early convergence at reduced complexities. The suggested method ensures that each communication More >

  • Open Access

    ARTICLE

    Innovative Lightweight Encryption Schemes Leveraging Chaotic Systems for Secure Data Transmission

    Haider H. Al-Mahmood1,*, Saad N. Alsaad2

    Intelligent Automation & Soft Computing, Vol.40, pp. 53-74, 2025, DOI:10.32604/iasc.2024.059691 - 10 January 2025

    Abstract In secure communications, lightweight encryption has become crucial, particularly for resource-constrained applications such as embedded devices, wireless sensor networks, and the Internet of Things (IoT). As these systems proliferate, cryptographic approaches that provide robust security while minimizing computing overhead, energy consumption, and memory usage are becoming increasingly essential. This study examines lightweight encryption techniques utilizing chaotic maps to ensure secure data transmission. Two algorithms are proposed, both employing the Logistic map; the first approach utilizes two logistic chaotic maps, while the second algorithm employs a single logistic chaotic map. Algorithm 1, including a two-stage mechanism… More >

  • Open Access

    ARTICLE

    An Asynchronous Data Transmission Policy for Task Offloading in Edge-Computing Enabled Ultra-Dense IoT

    Dayong Wang1,*, Kamalrulnizam Bin Abu Bakar1, Babangida Isyaku2, Liping Lei3

    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4465-4483, 2024, DOI:10.32604/cmc.2024.059616 - 19 December 2024

    Abstract In recent years, task offloading and its scheduling optimization have emerged as widely discussed and significant topics. The multi-objective optimization problems inherent in this domain, particularly those related to resource allocation, have been extensively investigated. However, existing studies predominantly focus on matching suitable computational resources for task offloading requests, often overlooking the optimization of the task data transmission process. This inefficiency in data transmission leads to delays in the arrival of task data at computational nodes within the edge network, resulting in increased service times due to elevated network transmission latencies and idle computational resources.… More >

  • Open Access

    REVIEW

    Wearable Healthcare and Continuous Vital Sign Monitoring with IoT Integration

    Hamed Taherdoost1,2,3,4,*

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 79-104, 2024, DOI:10.32604/cmc.2024.054378 - 15 October 2024

    Abstract Technical and accessibility issues in hospitals often prevent patients from receiving optimal mental and physical health care, which is essential for independent living, especially as societies age and chronic diseases like diabetes and cardiovascular disease become more common. Recent advances in the Internet of Things (IoT)-enabled wearable devices offer potential solutions for remote health monitoring and everyday activity recognition, gaining significant attention in personalized healthcare. This paper comprehensively reviews wearable healthcare technology integrated with the IoT for continuous vital sign monitoring. Relevant papers were extracted and analyzed using a systematic numerical review method, covering various More >

  • Open Access

    ARTICLE

    Enabling Efficient Data Transmission in Wireless Sensor Networks-Based IoT Applications

    Ibraheem Al-Hejri1, Farag Azzedin1,*, Sultan Almuhammadi1, Naeem Firdous Syed2

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4197-4218, 2024, DOI:10.32604/cmc.2024.047117 - 20 June 2024

    Abstract The use of the Internet of Things (IoT) is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices. In critical infrastructure domains like oil and gas supply, intelligent transportation, power grids, and autonomous agriculture, it is essential to guarantee the confidentiality, integrity, and authenticity of data collected and exchanged. However, the limited resources coupled with the heterogeneity of IoT devices make it inefficient or sometimes infeasible to achieve secure data transmission using traditional cryptographic techniques. Consequently, designing a lightweight secure More >

  • Open Access

    ARTICLE

    DNBP-CCA: A Novel Approach to Enhancing Heterogeneous Data Traffic and Reliable Data Transmission for Body Area Network

    Abdulwadood Alawadhi1,*, Mohd. Hasbullah Omar1, Abdullah Almogahed2, Noradila Nordin3, Salman A. Alqahtani4, Atif M. Alamri5

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2851-2878, 2024, DOI:10.32604/cmc.2024.050154 - 15 May 2024

    Abstract The increased adoption of Internet of Medical Things (IoMT) technologies has resulted in the widespread use of Body Area Networks (BANs) in medical and non-medical domains. However, the performance of IEEE 802.15.4-based BANs is impacted by challenges related to heterogeneous data traffic requirements among nodes, including contention during finite backoff periods, association delays, and traffic channel access through clear channel assessment (CCA) algorithms. These challenges lead to increased packet collisions, queuing delays, retransmissions, and the neglect of critical traffic, thereby hindering performance indicators such as throughput, packet delivery ratio, packet drop rate, and packet delay.… More >

  • Open Access

    ARTICLE

    Reliable Data Collection Model and Transmission Framework in Large-Scale Wireless Medical Sensor Networks

    Haosong Gou1, Gaoyi Zhang1, Renê Ripardo Calixto2, Senthil Kumar Jagatheesaperumal3, Victor Hugo C. de Albuquerque2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 1077-1102, 2024, DOI:10.32604/cmes.2024.047806 - 16 April 2024

    Abstract Large-scale wireless sensor networks (WSNs) play a critical role in monitoring dangerous scenarios and responding to medical emergencies. However, the inherent instability and error-prone nature of wireless links present significant challenges, necessitating efficient data collection and reliable transmission services. This paper addresses the limitations of existing data transmission and recovery protocols by proposing a systematic end-to-end design tailored for medical event-driven cluster-based large-scale WSNs. The primary goal is to enhance the reliability of data collection and transmission services, ensuring a comprehensive and practical approach. Our approach focuses on refining the hop-count-based routing scheme to achieve… More >

  • Open Access

    ARTICLE

    Intrusion Detection Model Using Chaotic MAP for Network Coding Enabled Mobile Small Cells

    Chanumolu Kiran Kumar, Nandhakumar Ramachandran*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3151-3176, 2024, DOI:10.32604/cmc.2023.043534 - 26 March 2024

    Abstract Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions, vulnerabilities, and assaults. Complex security systems, such as Intrusion Detection Systems (IDS), are essential due to the limitations of simpler security measures, such as cryptography and firewalls. Due to their compact nature and low energy reserves, wireless networks present a significant challenge for security procedures. The features of small cells can cause threats to the network. Network Coding (NC) enabled small cells are vulnerable to various types of attacks. Avoiding attacks and performing secure “peer” to “peer” data transmission is… More >

  • Open Access

    Time-Efficient Blockchain Framework for Improved Data Transmission in Autonomous Systems

    Abdulrahman M. Abdulghani, Wilbur L. Walters, Khalid H. Abed*

    Journal of Blockchain and Intelligent Computing, Vol.1, pp. 1-13, 2023, DOI:10.32604/jbic.2023.041340 - 29 September 2023

    Abstract Blockchain technology is increasingly used to design trustworthy and reliable platforms for sharing information in a plethora of industries. It is a decentralized system that acts as an immutable record for storing data. It has the potential to disrupt a range of fields that rely on data, including autonomous systems like Unmanned Aerial Vehicles (UAVs). In this paper, we propose a framework based on blockchain and distributed ledger technology to improve transmission time and provide a secured and trusted method for UAVs to transfer data to the consumer efficiently while maintaining data reliability. The results More >

  • Open Access

    ARTICLE

    Improved Harris Hawks Optimization Algorithm Based Data Placement Strategy for Integrated Cloud and Edge Computing

    V. Nivethitha*, G. Aghila

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 887-904, 2023, DOI:10.32604/iasc.2023.034247 - 29 April 2023

    Abstract Cloud computing is considered to facilitate a more cost-effective way to deploy scientific workflows. The individual tasks of a scientific workflow necessitate a diversified number of large states that are spatially located in different datacenters, thereby resulting in huge delays during data transmission. Edge computing minimizes the delays in data transmission and supports the fixed storage strategy for scientific workflow private datasets. Therefore, this fixed storage strategy creates huge amount of bottleneck in its storage capacity. At this juncture, integrating the merits of cloud computing and edge computing during the process of rationalizing the data… More >

Displaying 1-10 on page 1 of 38. Per Page