Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (8)
  • Open Access

    ARTICLE

    Complete Cototal Roman Domination Number of a Graph for User Preference Identification in Social Media

    J. Maria Regila Baby*, K. Uma Samundesvari

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2405-2415, 2023, DOI:10.32604/csse.2023.032240

    Abstract Many graph domination applications can be expanded to achieve complete cototal domination. If every node in a dominating set is regarded as a record server for a PC organization, then each PC affiliated with the organization has direct access to a document server. It is occasionally reasonable to believe that this gateway will remain available even if one of the scrape servers fails. Because every PC has direct access to at least two documents’ servers, a complete cototal dominating set provides the required adaptability to non-critical failure in such scenarios. In this paper, we presented a method for calculating a… More >

  • Open Access

    ARTICLE

    Intelligent Systems and Photovoltaic Cells Empowered Topologically by Sudoku Networks

    Khalid Hamid1, Muhammad Waseem Iqbal2, M. Usman Ashraf3, Akber Abid Gardezi4, Shafiq Ahmad5, Mejdal Alqahtani5, Muhammad Shafiq6,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4221-4238, 2023, DOI:10.32604/cmc.2023.034320

    Abstract A graph invariant is a number that can be easily and uniquely calculated through a graph. Recently, part of mathematical graph invariants has been portrayed and utilized for relationship examination. Nevertheless, no reliable appraisal has been embraced to pick, how much these invariants are associated with a network graph in interconnection networks of various fields of computer science, physics, and chemistry. In this paper, the study talks about sudoku networks will be networks of fractal nature having some applications in computer science like sudoku puzzle game, intelligent systems, Local area network (LAN) development and parallel processors interconnections, music composition creation,… More >

  • Open Access

    ARTICLE

    Topological Evaluation of Certain Computer Networks by Contraharmonic-Quadratic Indices

    Ahmed M. Alghamdi1,*, Khalid Hamid2, Muhammad Waseem Iqbal3, M. Usman Ashraf4, Abdullah Alshahrani5, Adel Alshamrani6

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3795-3810, 2023, DOI:10.32604/cmc.2023.033976

    Abstract In various fields, different networks are used, most of the time not of a single kind; but rather a mix of at least two networks. These kinds of networks are called bridge networks which are utilized in interconnection networks of PC, portable networks, spine of internet, networks engaged with advanced mechanics, power generation interconnection, bio-informatics and substance intensify structures. Any number that can be entirely calculated by a graph is called graph invariants. Countless mathematical graph invariants have been portrayed and utilized for connection investigation during the latest twenty years. Nevertheless, no trustworthy evaluation has been embraced to pick, how… More >

  • Open Access

    ARTICLE

    Optimized Evaluation of Mobile Base Station by Modern Topological Invariants

    Khalid Hamid1, Muhammad Waseem Iqbal2,*, Muhammad Usman Ashraf3, Ahmed Mohammed Alghamdi4, Adel A. Bahaddad5, Khalid Ali Almarhabi6

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 363-378, 2023, DOI:10.32604/cmc.2023.032271

    Abstract Due to a tremendous increase in mobile traffic, mobile operators have started to restructure their networks to offload their traffic. New research directions will lead to fundamental changes in the design of future Fifth-generation (5G) cellular networks. For the formal reason, the study solves the physical network of the mobile base station for the prediction of the best characteristics to develop an enhanced network with the help of graph theory. Any number that can be uniquely calculated by a graph is known as a graph invariant. During the last two decades, innumerable numerical graph invariants have been portrayed and used… More >

  • Open Access

    ARTICLE

    Multi-Zone-Wise Blockchain Based Intrusion Detection and Prevention System for IoT Environment

    Salaheddine Kably1,2,*, Tajeddine Benbarrad1, Nabih Alaoui2, Mounir Arioua1

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 253-278, 2023, DOI:10.32604/cmc.2023.032220

    Abstract Blockchain merges technology with the Internet of Things (IoT) for addressing security and privacy-related issues. However, conventional blockchain suffers from scalability issues due to its linear structure, which increases the storage overhead, and Intrusion detection performed was limited with attack severity, leading to performance degradation. To overcome these issues, we proposed MZWB (Multi-Zone-Wise Blockchain) model. Initially, all the authenticated IoT nodes in the network ensure their legitimacy by using the Enhanced Blowfish Algorithm (EBA), considering several metrics. Then, the legitimately considered nodes for network construction for managing the network using Bayesian-Direct Acyclic Graph (B-DAG), which considers several metrics. The intrusion… More >

  • Open Access

    ARTICLE

    K-Banhatti Invariants Empowered Topological Investigation of Bridge Networks

    Khalid Hamid1, Muhammad Waseem Iqbal2,*, Erssa Arif1, Yasir Mahmood3,4, Ahmad Salman Khan3, Nazri Kama4, Azri Azmi4, Atif Ikram5,6

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5423-5440, 2022, DOI:10.32604/cmc.2022.030927

    Abstract Any number that can be uniquely determined by a graph is called graph invariants. During the most recent twenty years’ innumerable numerical graph invariants have been described and used for correlation analysis. In the fast and advanced environment of manufacturing of networks and other products which used different networks, no dependable assessment has been embraced to choose, how much these invariants are connected with a network graph or molecular graph. In this paper, it will talk about three distinct variations of bridge networks with great capability of expectation in the field of computer science, chemistry, physics, drug industry, informatics, and… More >

  • Open Access

    ARTICLE

    K-Banhatti Sombor Invariants of Certain Computer Networks

    Khalid Hamid1, Muhammad Waseem Iqbal2,*, Abaid Ur Rehman Virk3, Muhammad Usman Ashraf4, Ahmed Mohammed Alghamdi5, Adel A. Bahaddad6, Khalid Ali Almarhabi7

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 15-31, 2022, DOI:10.32604/cmc.2022.028406

    Abstract Any number that can be uniquely determined by a graph is called a graph invariant. During the last twenty years’ countless mathematical graph invariants have been characterized and utilized for correlation analysis. However, no reliable examination has been embraced to decide, how much these invariants are related with a network graph or molecular graph. In this paper, it will discuss three different variants of bridge networks with good potential of prediction in the field of computer science, mathematics, chemistry, pharmacy, informatics and biology in context with physical and chemical structures and networks, because k-banhatti sombor invariants are freshly presented and… More >

  • Open Access

    ARTICLE

    Examining the Impacts of Key Influencers on Community Development

    Di Shang1,*, Mohammed Ghriga1

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 1-10, 2019, DOI:10.32604/cmc.2019.08217

    Abstract In this research, we aim to identify and investigate the impacts of key influencers on community formations and developments. We assess the impacts of key influencers by analyzing the activities and structure of the social media presence of a local community. Results of our analysis show that key influencers play important roles in connecting the community, transferring information, and improving overall sentiment of the community members. Our findings suggest that community practitioners can apply social network analysis to identify value-added influencers and discover strategies for improving the community and keeping leadership roles. More >

Displaying 1-10 on page 1 of 8. Per Page