Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31)
  • Open Access

    ARTICLE

    Secure Downlink Transmission Strategies against Active Eavesdropping in NOMA Systems: A Zero-Sum Game Approach

    Yanqiu Chen, Xiaopeng Ji*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.1, pp. 531-553, 2023, DOI:10.32604/cmes.2023.024531

    Abstract Non-orthogonal multiple access technology (NOMA), as a potentially promising technology in the 5G/B5G era, suffers from ubiquitous security threats due to the broadcast nature of the wireless medium. In this paper, we focus on artificial-signal-assisted and relay-assisted secure downlink transmission schemes against external eavesdropping in the context of physical layer security, respectively. To characterize the non-cooperative confrontation around the secrecy rate between the legitimate communication party and the eavesdropper, their interactions are modeled as a two-person zero-sum game. The existence of the Nash equilibrium of the proposed game models is proved, and the pure strategy Nash equilibrium and mixed-strategy Nash… More >

  • Open Access

    ARTICLE

    Efficient Power Control for UAV Based on Trajectory and Game Theory

    Fadhil Mukhlif1,*, Ashraf Osman Ibrahim2, Norafida Ithnin1, Roobaea Alroobaea3, Majed Alsafyani3

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5589-5606, 2023, DOI:10.32604/cmc.2023.034323

    Abstract Due to the fact that network space is becoming more limited, the implementation of ultra-dense networks (UDNs) has the potential to enhance not only network coverage but also network throughput. Unmanned Aerial Vehicle (UAV) communications have recently garnered a lot of attention due to the fact that they are extremely versatile and may be applied to a wide variety of contexts and purposes. A cognitive UAV is proposed as a solution for the Internet of Things ground terminal’s wireless nodes in this article. In the IoT system, the UAV is utilised not only to determine how the resources should be… More >

  • Open Access

    REVIEW

    A Review of the Current Task Offloading Algorithms, Strategies and Approach in Edge Computing Systems

    Abednego Acheampong1, Yiwen Zhang1,*, Xiaolong Xu2, Daniel Appiah Kumah2

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.1, pp. 35-88, 2023, DOI:10.32604/cmes.2022.021394

    Abstract Task offloading is an important concept for edge computing and the Internet of Things (IoT) because computationintensive tasks must be offloaded to more resource-powerful remote devices. Task offloading has several advantages, including increased battery life, lower latency, and better application performance. A task offloading method determines whether sections of the full application should be run locally or offloaded for execution remotely. The offloading choice problem is influenced by several factors, including application properties, network conditions, hardware features, and mobility, influencing the offloading system’s operational environment. This study provides a thorough examination of current task offloading and resource allocation in edge… More >

  • Open Access

    ARTICLE

    Generative Adversarial Networks for Secure Data Transmission in Wireless Network

    E. Jayabalan*, R. Pugazendi

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3757-3784, 2023, DOI:10.32604/iasc.2023.031200

    Abstract In this paper, a communication model in cognitive radios is developed and uses machine learning to learn the dynamics of jamming attacks in cognitive radios. It is designed further to make their transmission decision that automatically adapts to the transmission dynamics to mitigate the launched jamming attacks. The generative adversarial learning neural network (GALNN) or generative dynamic neural network (GDNN) automatically learns with the synthesized training data (training) with a generator and discriminator type neural networks that encompass minimax game theory. The elimination of the jamming attack is carried out with the assistance of the defense strategies and with an… More >

  • Open Access

    ARTICLE

    Energy Efficient Networks Using Ant Colony Optimization with Game Theory Clustering

    Harish Gunigari1,*, S. Chitra2

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3557-3571, 2023, DOI:10.32604/iasc.2023.029155

    Abstract Real-time applications based on Wireless Sensor Network (WSN) technologies quickly lead to the growth of an intelligent environment. Sensor nodes play an essential role in distributing information from networking and its transfer to the sinks. The ability of dynamical technologies and related techniques to be aided by data collection and analysis across the Internet of Things (IoT) network is widely recognized. Sensor nodes are low-power devices with low power devices, storage, and quantitative processing capabilities. The existing system uses the Artificial Immune System-Particle Swarm Optimization method to minimize the energy and improve the network’s lifespan. In the proposed system, a… More >

  • Open Access

    ARTICLE

    Game Theory-Based Dynamic Weighted Ensemble for Retinal Disease Classification

    Kanupriya Mittal*, V. Mary Anita Rajam

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1907-1921, 2023, DOI:10.32604/iasc.2023.029037

    Abstract An automated retinal disease detection system has long been in existence and it provides a safe, no-contact and cost-effective solution for detecting this disease. This paper presents a game theory-based dynamic weighted ensemble of a feature extraction-based machine learning model and a deep transfer learning model for automatic retinal disease detection. The feature extraction-based machine learning model uses Gaussian kernel-based fuzzy rough sets for reduction of features, and XGBoost classifier for the classification. The transfer learning model uses VGG16 or ResNet50 or Inception-ResNet-v2. A novel ensemble classifier based on the game theory approach is proposed for the fusion of the… More >

  • Open Access

    ARTICLE

    Sensitive Information Protection Model Based on Bayesian Game

    Yuzhen Liu1,2, Zhe Liu3, Xiaoliang Wang1,2,*, Qing Yang4, Guocai Zuo5, Frank Jiang6

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 883-898, 2022, DOI:10.32604/cmc.2022.029002

    Abstract

    A game measurement model considering the attacker's knowledge background is proposed based on the Bayesian game theory aiming at striking a balance between the protection of sensitive information and the quality of service. We quantified the sensitive level of information according to the user's personalized sensitive information protection needs. Based on the probability distribution of sensitive level and attacker's knowledge background type, the strategy combination of service provider and attacker was analyzed, and a game-based sensitive information protection model was constructed. Through the combination of strategies under Bayesian equilibrium, the information entropy was used to measure the leakage of sensitive… More >

  • Open Access

    ARTICLE

    Game Theory Based Decision Coordination Strategy of Agricultural Logistics Service Information System

    Long Guo1, Dongsheng Sun1,*, Abdul Waheed2, Huijie Gao3

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 513-532, 2022, DOI:10.32604/cmc.2022.028211

    Abstract Under the background of “Internet plus” rapid development, the agricultural logistics industry should apply information technology to every link of the agricultural product logistics industry chain. By making full use of the decision making module of the agricultural logistics information system, we can realize the full sharing of information and data resources, which makes the decision-making scheme of the agricultural logistics information system more optimized. In real economic society, the uncertainty and mismatch between the customer’s logistics service demand and the logistics service capability that the logistics service function provider can provide, that is, when the two information are asymmetric,… More >

  • Open Access

    ARTICLE

    Stream Cipher Based on Game Theory and DNA Coding

    Khaled Suwais*

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1815-1834, 2022, DOI:10.32604/iasc.2022.025076

    Abstract Securing communication over public communication channels is one of the challenging issues in the field of cryptography and information security. A stream cipher is presented as an approach for securing exchanged data between different parties through encryption. The core of stream cipher relies on its keystream generator, that is responsible for generating random and secure keystream of encrypting streaming data. Thus, the security of the keystream is measured by its randomness and its resistance to statistical and cryptanalytic attacks. As there is always a trade-off between the security and performance while designing new cryptographic primitives, we introduce a game theory-based… More >

  • Open Access

    ARTICLE

    Game Theory-Based IoT Efficient Power Control in Cognitive UAV

    Fadhil Mukhlif1,*, Norafida Ithnin1, Omar B. Abdulghafoor2, Faiz Alotaibi3, Nourah Saad Alotaibi4

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1561-1578, 2022, DOI:10.32604/cmc.2022.026074

    Abstract With the help of network densification, network coverage as well as the throughput can be improved via ultra-dense networks (UDNs). In tandem, Unmanned Aerial Vehicle (UAV) communications have recently garnered much attention because of their high agility as well as widespread applications. In this paper, a cognitive UAV is proposed for wireless nodes power pertaining to the IoT ground terminal. Further, the UAV is included in the IoT system as the source of power for the wireless nodes as well as for resource allocation. The quality of service (QoS) related to the cognitive node was considered as a utility function… More >

Displaying 11-20 on page 2 of 31. Per Page