Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (38)
  • Open Access

    ARTICLE

    Intelligent Deployment Model for Target Coverage in Wireless Sensor Network

    K. Subramanian*, S. Shanmugavel

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 739-754, 2023, DOI:10.32604/iasc.2023.027248 - 06 June 2022

    Abstract Target coverage and continuous connection are the major recital factors for Wireless Sensor Network (WSN). Several previous research works studied various algorithms for target coverage difficulties; however they lacked to focus on improving the network’s life time in terms of energy. This research work mainly focuses on target coverage and area coverage problem in a heterogeneous WSN with increased network lifetime. The dynamic behavior of the target nodes is unpredictable, because the target nodes may move at any time in any direction of the network. Thus, target coverage becomes a major problem in WSN and… More >

  • Open Access

    ARTICLE

    Production Dynamic Prediction Method of Waterflooding Reservoir Based on Deep Convolution Generative Adversarial Network (DC-GAN)

    Liyuan Xin1,2,3, Xiang Rao1,2,3,*, Xiaoyin Peng1,2,3, Yunfeng Xu1,2,3, Jiating Chen1,2,3

    Energy Engineering, Vol.119, No.5, pp. 1905-1922, 2022, DOI:10.32604/ee.2022.019556 - 21 July 2022

    Abstract The rapid production dynamic prediction of water-flooding reservoirs based on well location deployment has been the basis of production optimization of water-flooding reservoirs. Considering that the construction of geological models with traditional numerical simulation software is complicated, the computational efficiency of the simulation calculation is often low, and the numerical simulation tools need to be repeated iteratively in the process of model optimization, machine learning methods have been used for fast reservoir simulation. However, traditional artificial neural network (ANN) has large degrees of freedom, slow convergence speed, and complex network model. This paper aims to… More >

  • Open Access

    ARTICLE

    Optimal Deployment of Heterogeneous Nodes to Enhance Network Invulnerability

    Qian Sun1,2, Fengbo Yang1,2, Xiaoyi Wang2,3,*, Jiping Xu1,2, Huiyan Zhang1,2, Li Wang1,2, Jiabin Yu1,2, Xiao Peng1,2, Ruichao Wang4

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3081-3097, 2022, DOI:10.32604/cmc.2022.029366 - 16 June 2022

    Abstract Wireless sensor networks (WSN) can be used in many fields. In wireless sensor networks, sensor nodes transmit data in multi hop mode. The large number of hops required by data transmission will lead to unbalanced energy consumption and large data transmission delay of the whole network, which greatly affects the invulnerability of the network. Therefore, an optimal deployment of heterogeneous nodes (ODHN) algorithm is proposed to enhance the invulnerability of the wireless sensor networks. The algorithm combines the advantages of DEEC (design of distributed energy efficient clustering) clustering algorithm and BAS (beetle antenna search) optimization More >

  • Open Access

    ARTICLE

    Root-Of-Trust for Continuous Integration and Continuous Deployment Pipeline in Cloud Computing

    Abdul Saboor1,*, Mohd Fadzil Hassan2, Rehan Akbar1, Erwin Susanto3, Syed Nasir Mehmood Shah4, Muhammad Aadil Siddiqui5, Saeed Ahmed Magsi5

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2223-2239, 2022, DOI:10.32604/cmc.2022.028382 - 16 June 2022

    Abstract Cloud computing has gained significant use over the last decade due to its several benefits, including cost savings associated with setup, deployments, delivery, physical resource sharing across virtual machines, and availability of on-demand cloud services. However, in addition to usual threats in almost every computing environment, cloud computing has also introduced a set of new threats as consumers share physical resources due to the physical co-location paradigm. Furthermore, since there are a growing number of attacks directed at cloud environments (including dictionary attacks, replay code attacks, denial of service attacks, rootkit attacks, code injection attacks,… More >

  • Open Access

    ARTICLE

    Forecasting Mental Stress Using Machine Learning Algorithms

    Elias Hossain1, Abdulwahab Alazeb2,*, Naif Al Mudawi2, Sultan Almakdi2, Mohammed Alshehri2, M. Gazi Golam Faruque3, Wahidur Rahman3

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 4945-4966, 2022, DOI:10.32604/cmc.2022.027058 - 21 April 2022

    Abstract Depression is a crippling affliction and affects millions of individuals around the world. In general, the physicians screen patients for mental health disorders on a regular basis and treat patients in collaboration with psychologists and other mental health experts, which results in lower costs and improved patient outcomes. However, this strategy can necessitate a lot of buy-in from a large number of people, as well as additional training and logistical considerations. Thus, utilizing the machine learning algorithms, patients with depression based on information generally present in a medical file were analyzed and predicted. The methodology… More >

  • Open Access

    ARTICLE

    Design of Energy Efficient WSN Using a Noble SMOWA Algorithm

    Avishek Banerjee1, Deepak Garg1, Victor Das2, Laxminarayan Sahoo3, Ira Nath4, Vijayakumar Varadarajan5, Ketan Kotecha6,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3585-3600, 2022, DOI:10.32604/cmc.2022.025233 - 29 March 2022

    Abstract In this paper, the establishment of efficient Wireless Sensor Network (WSN) networks has been projected to minimize the consumption of energy using a new Self-adaptive Multi-Objective Weighted Approach (SMOWA) algorithm for solving a multi-objective problem. The Different WSN nodes deployment policies have been proposed and applied in this paper to design an efficient Wireless Sensor Network to minimize energy consumption. After that, the cluster head for each cluster has been selected with the help of the duty cycle. After configuring the WSN networks, the SMOWA algorithms have been developed to obtain the minimum energy consumption… More >

  • Open Access

    ARTICLE

    An Efficient On-Demand Virtual Machine Migration in Cloud Using Common Deployment Model

    C. Saravanakumar1,*, R. Priscilla1, B. Prabha2, A. Kavitha3, M. Prakash4, C. Arun5

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 245-256, 2022, DOI:10.32604/csse.2022.022122 - 02 December 2021

    Abstract Cloud Computing provides various services to the customer in a flexible and reliable manner. Virtual Machines (VM) are created from physical resources of the data center for handling huge number of requests as a task. These tasks are executed in the VM at the data center which needs excess hosts for satisfying the customer request. The VM migration solves this problem by migrating the VM from one host to another host and makes the resources available at any time. This process is carried out based on various algorithms which follow a predefined capacity of source… More >

  • Open Access

    ARTICLE

    Deployment of Polar Codes for Mission-Critical Machine-Type Communication Over Wireless Networks

    Najib Ahmed Mohammed1, Ali Mohammed Mansoor1,*, Rodina Binti Ahmad1, Saaidal Razalli Bin Azzuhri2

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 573-592, 2022, DOI:10.32604/cmc.2022.020462 - 03 November 2021

    Abstract Mission critical Machine-type Communication (mcMTC), also referred to as Ultra-reliable Low Latency Communication (URLLC), has become a research hotspot. It is primarily characterized by communication that provides ultra-high reliability and very low latency to concurrently transmit short commands to a massive number of connected devices. While the reduction in physical (PHY) layer overhead and improvement in channel coding techniques are pivotal in reducing latency and improving reliability, the current wireless standards dedicated to support mcMTC rely heavily on adopting the bottom layers of general-purpose wireless standards and customizing only the upper layers. The mcMTC has… More >

  • Open Access

    ARTICLE

    Exploring and Modelling IoT Offloading Policies in Edge Cloud Environments

    Jaber Almutairi1, Mohammad Aldossary2,*

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 611-624, 2022, DOI:10.32604/csse.2022.018112 - 25 October 2021

    Abstract The Internet of Things (IoT) has recently become a popular technology that can play increasingly important roles in every aspect of our daily life. For collaboration between IoT devices and edge cloud servers, edge server nodes provide the computation and storage capabilities for IoT devices through the task offloading process for accelerating tasks with large resource requests. However, the quantitative impact of different offloading architectures and policies on IoT applications’ performance remains far from clear, especially with a dynamic and unpredictable range of connected physical and virtual devices. To this end, this work models the More >

  • Open Access

    ARTICLE

    A Cost-Effective Approach for NDN-Based Internet of Medical Things Deployment

    Syed Sajid Ullah1, Saddam Hussain1, Abdu Gumaei2,3,*, Mohsin S. Alhilal4, Bader Fahad Alkhamees4, Mueen Uddin5, Mabrook Al-Rakhami2

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 233-249, 2022, DOI:10.32604/cmc.2022.017971 - 07 September 2021

    Abstract Nowadays, healthcare has become an important area for the Internet of Things (IoT) to automate healthcare facilities to share and use patient data anytime and anywhere with Internet services. At present, the host-based Internet paradigm is used for sharing and accessing healthcare-related data. However, due to the location-dependent nature, it suffers from latency, mobility, and security. For this purpose, Named Data Networking (NDN) has been recommended as the future Internet paradigm to cover the shortcomings of the traditional host-based Internet paradigm. Unfortunately, the novel breed lacks a secure framework for healthcare. This article constructs an More >

Displaying 21-30 on page 3 of 38. Per Page