Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5)
  • Open Access

    ARTICLE

    Energy Based Random Repeat Trust Computation in Delay Tolerant Network

    S. Dheenathayalan*, B. Paramasivan

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 2845-2859, 2023, DOI:10.32604/csse.2023.033326

    Abstract As the use of mobile devices continues to rise, trust administration will significantly improve security in routing the guaranteed quality of service (QoS) supply in Mobile Ad Hoc Networks (MANET) due to the mobility of the nodes. There is no continuance of network communication between nodes in a delay-tolerant network (DTN). DTN is designed to complete recurring connections between nodes. This approach proposes a dynamic source routing protocol (DSR) based on a feed-forward neural network (FFNN) and energy-based random repetition trust calculation in DTN. If another node is looking for a node that swerved off of its path in this… More >

  • Open Access

    ARTICLE

    An Improved Multi-Objective Particle Swarm Optimization Routing on MANET

    G. Rajeshkumar1,*, M. Vinoth Kumar2, K. Sailaja Kumar3, Surbhi Bhatia4, Arwa Mashat5, Pankaj Dadheech6

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1187-1200, 2023, DOI:10.32604/csse.2023.026137

    Abstract A Mobile Ad hoc Network (MANET) is a group of low-power consumption of wireless mobile nodes that configure a wireless network without the assistance of any existing infrastructure/centralized organization. The primary aim of MANETs is to extend flexibility into the self-directed, mobile, and wireless domain, in which a cluster of autonomous nodes forms a MANET routing system. An Intrusion Detection System (IDS) is a tool that examines a network for malicious behavior/policy violations. A network monitoring system is often used to report/gather any suspicious attacks/violations. An IDS is a software program or hardware system that monitors network/security traffic for malicious… More >

  • Open Access

    ARTICLE

    Deep Learning Convolutional Neural Network for ECG Signal Classification Aggregated Using IoT

    S. Karthiga*, A. M. Abirami

    Computer Systems Science and Engineering, Vol.42, No.3, pp. 851-866, 2022, DOI:10.32604/csse.2022.021935

    Abstract Much attention has been given to the Internet of Things (IoT) by citizens, industries, governments, and universities for applications like smart buildings, environmental monitoring, health care and so on. With IoT, network connectivity is facilitated between smart devices from anyplace and anytime. IoT-based health monitoring systems are gaining popularity and acceptance for continuous monitoring and detect health abnormalities from the data collected. Electrocardiographic (ECG) signals are widely used for heart diseases detection. A novel method has been proposed in this work for ECG monitoring using IoT techniques. In this work, a two-stage approach is employed. In the first stage, a… More >

  • Open Access

    ARTICLE

    A Dominating Set Routing Scheme for Adaptive Caching in Ad Hoc Network

    Raed Alsaqour1, Ammar Al-hamadani2, Maha Abdelhaq3,*, Joud Almeheimidy3

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1587-1603, 2022, DOI:10.32604/iasc.2022.021127

    Abstract Current efforts for providing an efficient dynamic source routing protocol (DSR) for use in multi-hop ad-hoc wireless are promising. This is since DSR has a unique characteristic in that it uses source routing, instead of relying on the routing table at each intermediate device. This study addresses the current challenges facing DSR protocol in terms of the dynamic changes of the route and how to update such changes into the route cache of the DSR. The challenges typically persist when a sudden route break occurs resulting in a delay in updating the new node location into the cache of the… More >

  • Open Access

    ARTICLE

    Packet Drop Battling Mechanism for Energy Aware Detection in Wireless Networks

    Ahmad F. Subahi1,*, Youseef Alotaibi2, Osamah Ibrahim Khalaf3, F. Ajesh4

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 2077-2086, 2021, DOI:10.32604/cmc.2020.014094

    Abstract Network security and energy consumption are deemed to be two important components of wireless and mobile ad hoc networks (WMANets). There are various routing attacks which harm Ad Hoc networks. This is because of the unsecure wireless communication, resource constrained capabilities and dynamic topology. In order to cope with these issues, Ad Hoc On-Demand Distance Vector (AODV) routing protocol can be used to remain the normal networks functionality and to adjust data transmission by defending the networks against black hole attacks. The proposed system, in this work, identifies the optimal route from sender to collector, prioritizing the number of jumps,… More >

Displaying 1-10 on page 1 of 5. Per Page