Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5)
  • Open Access

    ARTICLE

    Two-Way Neural Network Performance Prediction Model Based on Knowledge Evolution and Individual Similarity

    Xinzheng Wang1,2,*, Bing Guo1, Yan Shen3

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1183-1206, 2024, DOI:10.32604/cmes.2023.029552

    Abstract Predicting students’ academic achievements is an essential issue in education, which can benefit many stakeholders, for instance, students, teachers, managers, etc. Compared with online courses such as MOOCs, students’ academic-related data in the face-to-face physical teaching environment is usually sparsity, and the sample size is relatively small. It makes building models to predict students’ performance accurately in such an environment even more challenging. This paper proposes a Two-Way Neural Network (TWNN) model based on the bidirectional recurrent neural network and graph neural network to predict students’ next semester’s course performance using only their previous course achievements. Extensive experiments on a… More > Graphic Abstract

    Two-Way Neural Network Performance Prediction Model Based on Knowledge Evolution and Individual Similarity

  • Open Access

    ARTICLE

    Grey Hole Attack Detection and Prevention Methods in Wireless Sensor Networks

    Gowdham Chinnaraju*, S. Nithyanandam

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 373-386, 2022, DOI:10.32604/csse.2022.020993

    Abstract Wireless Sensor Networks (WSNs) gained wide attention in the past decade, thanks to its attractive features like flexibility, monitoring capability, and scalability. It overcomes the crucial problems experienced in network management and facilitates the development of diverse network architectures. The existence of dynamic and adaptive routing features facilitate the quick formation of such networks. But flexible architecture also makes it highly vulnerable to different sorts of attacks, for instance, Denial of Service (DoS). Grey Hole Attack (GHA) is the most crucial attack types since it creates a heavy impact upon the components of WSN and eventually degrades the performance of… More >

  • Open Access

    ARTICLE

    Multi-indicator Active Queue Management Method

    Mosleh M. Abualhaj*, Abdelrahman H. Hussein, Qasem M. Kharma, Qusai Y. Shambour

    Computer Systems Science and Engineering, Vol.38, No.2, pp. 251-263, 2021, DOI:10.32604/csse.2021.015787

    Abstract A considerable number of applications are running over IP networks. This increased the contention on the network resource, which ultimately results in congestion. Active queue management (AQM) aims to reduce the serious consequences of network congestion in the router buffer and its negative effects on network performance. AQM methods implement different techniques in accordance with congestion indicators, such as queue length and average queue length. The performance of the network is evaluated using delay, loss, and throughput. The gap between congestion indicators and network performance measurements leads to the decline in network performance. In this study, delay and loss predictions… More >

  • Open Access

    ARTICLE

    Optimal Coverage Multi-Path Scheduling Scheme with Multiple Mobile Sinks for WSNs

    Jin Wang1, 2, 3, Yu Gao2, Chang Zhou2, R. Simon Sherratt4, Lei Wang5, *

    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 695-711, 2020, DOI:10.32604/cmc.2020.08674

    Abstract Wireless Sensor Networks (WSNs) are usually formed with many tiny sensors which are randomly deployed within sensing field for target monitoring. These sensors can transmit their monitored data to the sink in a multi-hop communication manner. However, the ‘hot spots’ problem will be caused since nodes near sink will consume more energy during forwarding. Recently, mobile sink based technology provides an alternative solution for the long-distance communication and sensor nodes only need to use single hop communication to the mobile sink during data transmission. Even though it is difficult to consider many network metrics such as sensor position, residual energy… More >

  • Open Access

    ARTICLE

    Improved Enhanced Dbtma with Contention-Aware Admission Control to Improve the Network Performance in Manets

    M. Sivaram1,*, D. Yuvaraj2, Amin Salih Mohammed3, V. Manikandan4, V. Porkodi4, N. Yuvaraj5

    CMC-Computers, Materials & Continua, Vol.60, No.2, pp. 435-454, 2019, DOI:10.32604/cmc.2019.06295

    Abstract DBTMA relies entirely on RTS/CTS dialogue for un-collided transmission of data. The purpose is to improve the QoS at MAC layer by developing it over 802.11e standard. However, DBTMA does not guarantee real-time constraints without efficient method for controlling the network loads. The main challenges in MANETs include prediction of the available bandwidth, establishing communication with neighboring nodes and predicting the consumption of bandwidth flow. These challenges are provided with solutions using Contention-Aware Admission Control (CACP) protocol. In this paper, the EDBTMA protocol is combined with CACP protocol that introduces bandwidth calculation using admission control strategy. The calculation includes certain… More >

Displaying 1-10 on page 1 of 5. Per Page