Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (16)
  • Open Access

    ARTICLE

    Intrusion Detection Model Using Chaotic MAP for Network Coding Enabled Mobile Small Cells

    Chanumolu Kiran Kumar, Nandhakumar Ramachandran*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3151-3176, 2024, DOI:10.32604/cmc.2023.043534

    Abstract Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions, vulnerabilities, and assaults. Complex security systems, such as Intrusion Detection Systems (IDS), are essential due to the limitations of simpler security measures, such as cryptography and firewalls. Due to their compact nature and low energy reserves, wireless networks present a significant challenge for security procedures. The features of small cells can cause threats to the network. Network Coding (NC) enabled small cells are vulnerable to various types of attacks. Avoiding attacks and performing secure “peer” to “peer” data transmission is a challenging task in small… More >

  • Open Access

    ARTICLE

    An Encode-and CRT-Based Scalability Scheme for Optimizing Transmission in Blockchain

    Qianqi Sun, Fenhua Bai*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1733-1754, 2024, DOI:10.32604/cmes.2023.044558

    Abstract Blockchain technology has witnessed a burgeoning integration into diverse realms of economic and societal development. Nevertheless, scalability challenges, characterized by diminished broadcast efficiency, heightened communication overhead, and escalated storage costs, have significantly constrained the broad-scale application of blockchain. This paper introduces a novel Encode-and CRT-based Scalability Scheme (ECSS), meticulously refined to enhance both block broadcasting and storage. Primarily, ECSS categorizes nodes into distinct domains, thereby reducing the network diameter and augmenting transmission efficiency. Secondly, ECSS streamlines block transmission through a compact block protocol and robust RS coding, which not only reduces the size of broadcasted blocks but also ensures transmission… More >

  • Open Access

    ARTICLE

    Multiway Relay Based Framework for Network Coding in Multi-Hop WSNs

    Vinod Kumar Menaria1, Anand Nayyar2, Sandeep Kumar3, Ketan Kotecha4,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1199-1216, 2023, DOI:10.32604/cmc.2023.032162

    Abstract In today’s information technology (IT) world, the multi-hop wireless sensor networks (MHWSNs) are considered the building block for the Internet of Things (IoT) enabled communication systems for controlling everyday tasks of organizations and industry to provide quality of service (QoS) in a stipulated time slot to end-user over the Internet. Smart city (SC) is an example of one such application which can automate a group of civil services like automatic control of traffic lights, weather prediction, surveillance, etc., in our daily life. These IoT-based networks with multi-hop communication and multiple sink nodes provide efficient communication in terms of performance parameters… More >

  • Open Access

    ARTICLE

    A Beamforming Technique Using Rotman Lens Antenna for Wireless Relay Networks

    Samer Alabed*, Mohammad Al-Rabayah, Wael Hosny Fouad Aly

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5641-5653, 2022, DOI:10.32604/cmc.2022.030371

    Abstract Rotman lens, which is a radio frequency beam-former that consists of multiple input and multiple output beam ports, can be used in industrial, scientific, and medical applications as a beam steering device. The input ports collect the signals to be propagated through the lens cavity toward the output ports before being transmitted by the antenna arrays to the destination in order to enhance the error performance by optimizing the overall signal to noise ratio (SNR). In this article, a low-cost Rotman lens antenna is designed and deployed to enhance the overall performance of the conventional cooperative communication systems without needing… More >

  • Open Access

    ARTICLE

    Quantum Remote State Preparation Based on Quantum Network Coding

    Zhen-Zhen Li1, Zi-Chen Li1, Yi-Ru Sun2,3,*, Haseeb Ahmad4, Gang Xu5,6, Xiu-Bo Chen3

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 119-132, 2022, DOI:10.32604/cmc.2022.027437

    Abstract As an innovative theory and technology, quantum network coding has become the research hotspot in quantum network communications. In this paper, a quantum remote state preparation scheme based on quantum network coding is proposed. Comparing with the general quantum remote state preparation schemes, our proposed scheme brings an arbitrary unknown quantum state finally prepared remotely through the quantum network, by designing the appropriate encoding and decoding steps for quantum network coding. What is worth mentioning, from the network model, this scheme is built on the quantum k-pair network which is the expansion of the typical bottleneck network—butterfly network. Accordingly, it… More >

  • Open Access

    ARTICLE

    QoS Constrained Network Coding Technique to Data Transmission Using IoT

    A. Sathishkumar1,*, T. Rammohan2, S. Sathish Kumar3, J. Uma3, K. Srujan Raju4, Aarti Sangwan5, M. Sivachitra6, M. Prabu7

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 531-544, 2022, DOI:10.32604/csse.2022.021694

    Abstract The research work presents, constrained network coding technique to ensure the successful data transmission based composite channel cmos technology using dielectric properties. The charge fragmentation and charge splitting are two components of the filtered switch domino (FSD) technique. Further behavior of selected switching is achieved using generator called conditional pulse generator which is employed in Multi Dynamic Node Domino (MDND) technique. Both FSD and MDND technique need wide area compared to existing single node-keeper domino technique. The aim of this research is to minimize dissipation of power and to achieve less consumption of power. The proposed research, works by introducing… More >

  • Open Access

    ARTICLE

    Improved Bi-Directional Three-Phase Single-Relay Selection Technique for Cooperative Wireless Communications

    Samer Alabed*, Issam Maaz, Mohammad Al-Rabayah

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 999-1015, 2022, DOI:10.32604/cmc.2022.019758

    Abstract Single-relay selection techniques based on the max-min criterion can achieve the highest bit error rate (BER) performance with full diversity gain as compared to the state-of-the-art single-relay selection techniques. Therefore, in this work, we propose a modified max-min criterion by considering the differences among the close value channels of all relays while selecting the best relay node. The proposed criterion not only enjoys full diversity gain but also offers a significant improvement in the achievable coding gain as compared to the conventional one. Basically, in this article, an improved bi-directional three-phase single-relay selection technique using the decode-and-forward protocol for wireless… More >

  • Open Access

    ARTICLE

    Controlled Quantum Network Coding Without Loss of Information

    Xing-Bo Pan1, Xiu-Bo Chen1,*, Gang Xu2, Haseeb Ahmad3, Tao Shang4, Zong-Peng Li5,6, Yi-Xian Yang1

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3967-3979, 2021, DOI:10.32604/cmc.2021.017087

    Abstract Quantum network coding is used to solve the congestion problem in quantum communication, which will promote the transmission efficiency of quantum information and the total throughput of quantum network. We propose a novel controlled quantum network coding without information loss. The effective transmission of quantum states on the butterfly network requires the consent form a third-party controller Charlie. Firstly, two pairs of three-particle non-maximum entangled states are pre-shared between senders and controller. By adding auxiliary particles and local operations, the senders can predict whether a certain quantum state can be successfully transmitted within the butterfly network based on the basis.… More >

  • Open Access

    ARTICLE

    Measurement-based Quantum Repeater Network Coding

    Si-Yi Chen1, Gang Xu2, Xiu-Bo Chen1, Haseeb Ahmad3, Yu-Ling Chen4,*

    Intelligent Automation & Soft Computing, Vol.30, No.1, pp. 273-284, 2021, DOI:10.32604/iasc.2021.018120

    Abstract Quantum network coding can effectively improve the aggregate throughput of quantum networks and alleviate bottlenecks caused by topological constraints. Most of previous schemes are dedicated to the efficient teleportation of unknown quantum states in a quantum network. Herein a proposal for transmission of deterministic known states over quantum repeater network based on quantum measurements. We show that the new protocol offers advantages over three aspects. Firstly, the senders in our protocol obtain the knowledge of the quantum state to be transmitted, which enables the autonomy of quantum network transmission. Secondly, we study the quantum repeater network coding for long-distance deterministic… More >

  • Open Access

    ARTICLE

    A Hybrid Scheme for Secure Wireless Communications in IoT

    Muhammad Irshad Nazeer1,2,*, Ghulam Ali Mallah1, Raheel Ahmed Memon2

    Intelligent Automation & Soft Computing, Vol.29, No.2, pp. 633-648, 2021, DOI:10.32604/iasc.2021.017771

    Abstract Network Coding is a potential technology for the future wireless communications and Internet of Things (IoT) as it reduces the number of transmissions and offers energy efficiency. It is vulnerable to threat and attack that can harm intermediate nodes. Indeed, it exhibits an ability to incorporate security of transmitted data, yet a lot of work needs to be done to provide a safeguard from threats. The purpose of this study is to strengthen the existing Network Coding scheme with a set of generic requirements for Network Coding Protocols by adopting system models and a Genetic Algorithm based cryptosystem. A hybrid… More >

Displaying 1-10 on page 1 of 16. Per Page