Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (110)
  • Open Access


    Wake-Up Security: Effective Security Improvement Mechanism for Low Power Internet of Things

    Sun-Woo Yun1, Na-Eun Park1, Il-Gu Lee1,2,*

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2897-2917, 2023, DOI:10.32604/iasc.2023.039940

    Abstract As time and space constraints decrease due to the development of wireless communication network technology, the scale and scope of cyberattacks targeting the Internet of Things (IoT) are increasing. However, it is difficult to apply high-performance security modules to the IoT owing to the limited battery, memory capacity, and data transmission performance depending on the size of the device. Conventional research has mainly reduced power consumption by lightening encryption algorithms. However, it is difficult to defend large-scale information systems and networks against advanced and intelligent attacks because of the problem of deteriorating security performance. In this study, we propose wake-up… More >

  • Open Access


    Fairness-Aware Harvested Energy Efficiency Algorithm for IRS-Aided Intelligent Sensor Networks with SWIPT

    Yingying Chen1, Weiqiang Tan2, Shidang Li3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.3, pp. 2675-2691, 2023, DOI:10.32604/cmes.2023.028533

    Abstract In this paper, a novel fairness-aware harvested energy efficiency-based green transmission scheme for wireless information and power transfer (SWIPT) aided sensor networks is developed for active beamforming of multiantenna transmitter and passive beamforming at intelligent reflecting surfaces (IRS). By optimizing the active beamformer assignment at the transmitter in conjunction with the passive beamformer assignment at the IRS, we aim to maximize the minimum harvested energy efficiency among all the energy receivers (ER) where information receivers (IR) are bound to the signal-interference-noise-ratio (SINR) and the maximum transmitted power of the transmitter. To handle the non-convex problem, both semi-definite relaxation (SDR) and… More >

  • Open Access


    Decision Analysis on IoV Routing Transmission and Energy Efficiency Optimization Algorithm with AmBC

    Baofeng Ji1,2,3,*, Mingkun Zhang1,2, Weixing Wang1, Song Chen4

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.3, pp. 2661-2673, 2023, DOI:10.32604/cmes.2023.028762

    Abstract The improvement of the quality and efficiency of vehicle wireless network data transmission is always a key concern in the Internet of Vehicles (IoV). Routing transmission solved the limitation of transmission distance to a certain extent. Traditional routing algorithm cannot adapt to complex traffic environment, resulting in low transmission efficiency. In order to improve the transmission success rate and quality of vehicle network routing transmission, make the routing algorithm more suitable for complex traffic environment, and reduce transmission power consumption to improve energy efficiency, a comprehensive optimized routing transmission algorithm is proposed. Based on the routing transmission algorithm, an optimization… More >

  • Open Access


    An OP-TEE Energy-Efficient Task Scheduling Approach Based on Mobile Application Characteristics

    Hai Wang*, Xuan Hao, Shuo Ji*, Jie Zheng, Yuhui Ma, Jianfeng Yang

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1621-1635, 2023, DOI:10.32604/iasc.2023.037898

    Abstract Trusted Execution Environment (TEE) is an important part of the security architecture of modern mobile devices, but its secure interaction process brings extra computing burden to mobile devices. This paper takes open portable trusted execution environment (OP-TEE) as the research object and deploys it to Raspberry Pi 3B, designs and implements a benchmark for OP-TEE, and analyzes its program characteristics. Furthermore, the application execution time, energy consumption and energy-delay product (EDP) are taken as the optimization objectives, and the central processing unit (CPU) frequency scheduling strategy of mobile devices is dynamically adjusted according to the characteristics of different applications through… More >

  • Open Access



    Hai-Dong Wanga , Zeng-Yuan Guoa,*

    Frontiers in Heat and Mass Transfer, Vol.13, pp. 1-12, 2019, DOI:10.5098/hmt.13.20

    Abstract The classical heat transfer theory is established on the empirical models of Fourier’s heat conduction law and Newton’s cooling law. Although the classical theory has been successfully used in a wide range of industrial engineering applications, it lacks deep understanding of the physical mechanisms for energy transport and analytical methodology based on solid mathematical and mechanical principles. The rapid development of modern science and technology challenges the traditional heat transfer theory in two aspects: (1) Fourier’s law of heat conduction is no longer valid under the ultra-fast laser heating or nanoscale conditions; (2) The optimization principle minimizing entropy generation is… More >

  • Open Access


    Virtual Machine Consolidation with Multi-Step Prediction and Affinity-Aware Technique for Energy-Efficient Cloud Data Centers

    Pingping Li*, Jiuxin Cao

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 81-105, 2023, DOI:10.32604/cmc.2023.039076

    Abstract Virtual machine (VM) consolidation is an effective way to improve resource utilization and reduce energy consumption in cloud data centers. Most existing studies have considered VM consolidation as a bin-packing problem, but the current schemes commonly ignore the long-term relationship between VMs and hosts. In addition, there is a lack of long-term consideration for resource optimization in the VM consolidation, which results in unnecessary VM migration and increased energy consumption. To address these limitations, a VM consolidation method based on multi-step prediction and affinity-aware technique for energy-efficient cloud data centers (MPaAFVMC) is proposed. The proposed method uses an improved linear… More >

  • Open Access


    Design of Evolutionary Algorithm Based Unequal Clustering for Energy Aware Wireless Sensor Networks

    Mohammed Altaf Ahmed1, T. Satyanarayana Murthy2, Fayadh Alenezi3, E. Laxmi Lydia4, Seifedine Kadry5,6,7, Yena Kim8, Yunyoung Nam8,*

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1283-1297, 2023, DOI:10.32604/csse.2023.035786

    Abstract Wireless Sensor Networks (WSN) play a vital role in several real-time applications ranging from military to civilian. Despite the benefits of WSN, energy efficiency becomes a major part of the challenging issue in WSN, which necessitate proper load balancing amongst the clusters and serves a wider monitoring region. The clustering technique for WSN has several benefits: lower delay, higher energy efficiency, and collision avoidance. But clustering protocol has several challenges. In a large-scale network, cluster-based protocols mainly adapt multi-hop routing to save energy, leading to hot spot problems. A hot spot problem becomes a problem where a cluster node nearer… More >

  • Open Access


    Coati Optimization-Based Energy Efficient Routing Protocol for Unmanned Aerial Vehicle Communication

    Hanan Abdullah Mengash1, Hamed Alqahtani2, Mohammed Maray3, Mohamed K. Nour4, Radwa Marzouk1, Mohammed Abdullah Al-Hagery5, Heba Mohsen6, Mesfer Al Duhayyim7,*

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 4805-4820, 2023, DOI:10.32604/cmc.2023.037810

    Abstract With the flexible deployment and high mobility of Unmanned Aerial Vehicles (UAVs) in an open environment, they have generated considerable attention in military and civil applications intending to enable ubiquitous connectivity and foster agile communications. The difficulty stems from features other than mobile ad-hoc network (MANET), namely aerial mobility in three-dimensional space and often changing topology. In the UAV network, a single node serves as a forwarding, transmitting, and receiving node at the same time. Typically, the communication path is multi-hop, and routing significantly affects the network’s performance. A lot of effort should be invested in performance analysis for selecting… More >

  • Open Access


    Quantum Cat Swarm Optimization Based Clustering with Intrusion Detection Technique for Future Internet of Things Environment

    Mohammed Basheri, Mahmoud Ragab*

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3783-3798, 2023, DOI:10.32604/csse.2023.037130

    Abstract The Internet of Things (IoT) is one of the emergent technologies with advanced developments in several applications like creating smart environments, enabling Industry 4.0, etc. As IoT devices operate via an inbuilt and limited power supply, the effective utilization of available energy plays a vital role in designing the IoT environment. At the same time, the communication of IoT devices in wireless mediums poses security as a challenging issue. Recently, intrusion detection systems (IDS) have paved the way to detect the presence of intrusions in the IoT environment. With this motivation, this article introduces a novel Quantum Cat Swarm Optimization… More >

  • Open Access


    Read-Write Dependency Aware Register Allocation

    Sheng Xiao1,*, Yong Chen2, Jing He3, Xi Yang4

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3527-3540, 2023, DOI:10.32604/csse.2023.027081

    Abstract Read-write dependency is an important factor restricting software efficiency. Timing Speculative (TS) is a processing architecture aiming to improve energy efficiency of microprocessors. Timing error rate, influenced by the read-write dependency, bottlenecks the voltage down-scaling and so the energy efficiency of TS processors. We proposed a method called Read-Write Dependency Aware Register Allocation. It is based on the Read-Write Dependency aware Interference Graph (RWDIG) conception. Registers are reallocated to loosen the read-write dependencies, so resulting in a reduction of timing errors. The traditional no operation (Nop) padding method is also redesigned to increase the distance value to above 2. We… More >

Displaying 1-10 on page 1 of 110. Per Page