Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (40)
  • Open Access

    ARTICLE

    A Coprocessor Architecture for 80/112-bit Security Related Applications

    Muhammad Rashid*, Majid Alotaibi

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6849-6865, 2023, DOI:10.32604/cmc.2023.032849 - 28 December 2022

    Abstract We have proposed a flexible coprocessor key-authentication architecture for 80/112-bit security-related applications over field by employing Elliptic-curve Diffie Hellman (ECDH) protocol. Towards flexibility, a serial input/output interface is used to load/produce secret, public, and shared keys sequentially. Moreover, to reduce the hardware resources and to achieve a reasonable time for cryptographic computations, we have proposed a finite field digit-serial multiplier architecture using combined shift and accumulate techniques. Furthermore, two finite-state-machine controllers are used to perform efficient control functionalities. The proposed coprocessor architecture over and is programmed using Verilog and then implemented on Xilinx Virtex-7 FPGA More >

  • Open Access

    ARTICLE

    DERNNet: Dual Encoding Recurrent Neural Network Based Secure Optimal Routing in WSN

    A. Venkatesh1, S. Asha2,*

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1375-1392, 2023, DOI:10.32604/csse.2023.030944 - 03 November 2022

    Abstract A Wireless Sensor Network (WSN) is constructed with numerous sensors over geographical regions. The basic challenge experienced while designing WSN is in increasing the network lifetime and use of low energy. As sensor nodes are resource constrained in nature, novel techniques are essential to improve lifetime of nodes in WSN. Nodes energy is considered as an important resource for sensor node which are battery powered based. In WSN, energy is consumed mainly while data is being transferred among nodes in the network. Several research works are carried out focusing on preserving energy of nodes in… More >

  • Open Access

    ARTICLE

    Avoid Suspicious Route of Blackhole Nodes in MANET’s: Using A Cooperative Trapping

    Abdllkader Esaid1,*, Mary Agoyi2

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1901-1915, 2023, DOI:10.32604/csse.2023.027819 - 03 November 2022

    Abstract Mobile Ad hoc Network (MANET) is decentralized wireless network and can communicate without existing infrastructure in many areas. MANET is vulnerable to various attacks that affect its performance such as blackhole attack. Blackhole attacker, inject fault routing information to persuade the source node to select the path with malicious node as the shortest path. To eliminate malicious nodes from launching any collaborative attack. A cooperative Trapping Approach (CTA) was proposed based on modifying Ad-hoc On-demand Distance Vector (AODV) routing protocol and trapping the malicious nodes by responding to the trap request message. The approach aims to More >

  • Open Access

    ARTICLE

    Energy Efficient Unequal Fault Tolerance Clustering Approach

    Sowjanya Ramisetty1,2, Divya Anand2, Kavita3,*, Sahil Verma3, NZ Jhanjhi4, Mehedi Masud5, Mohammed Baz6

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1971-1983, 2023, DOI:10.32604/csse.2022.021924 - 03 November 2022

    Abstract For achieving Energy-Efficiency in wireless sensor networks (WSNs), different schemes have been proposed which focuses only on reducing the energy consumption. A shortest path determines for the Base Station (BS), but fault tolerance and energy balancing gives equal importance for improving the network lifetime. For saving energy in WSNs, clustering is considered as one of the effective methods for Wireless Sensor Networks. Because of the excessive overload, more energy consumed by cluster heads (CHs) in a cluster based WSN to receive and aggregate the information from member sensor nodes and it leads to failure. For… More >

  • Open Access

    ARTICLE

    Intelligent Aquila Optimization Algorithm-Based Node Localization Scheme for Wireless Sensor Networks

    Nidhi Agarwal1,2, M. Gokilavani3, S. Nagarajan4, S. Saranya5, Hadeel Alsolai6, Sami Dhahbi7,*, Amira Sayed Abdelaziz8

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 141-152, 2023, DOI:10.32604/cmc.2023.030074 - 22 September 2022

    Abstract In recent times, wireless sensor network (WSN) finds their suitability in several application areas, ranging from military to commercial ones. Since nodes in WSN are placed arbitrarily in the target field, node localization (NL) becomes essential where the positioning of the nodes can be determined by the aid of anchor nodes. The goal of any NL scheme is to improve the localization accuracy and reduce the localization error rate. With this motivation, this study focuses on the design of Intelligent Aquila Optimization Algorithm Based Node Localization Scheme (IAOAB-NLS) for WSN. The presented IAOAB-NLS model makes More >

  • Open Access

    ARTICLE

    Routing with Cooperative Nodes Using Improved Learning Approaches

    R. Raja1,*, N. Satheesh2, J. Britto Dennis3, C. Raghavendra4

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 2857-2874, 2023, DOI:10.32604/iasc.2023.026153 - 17 August 2022

    Abstract In IoT, routing among the cooperative nodes plays an incredible role in fulfilling the network requirements and enhancing system performance. The evaluation of optimal routing and related routing parameters over the deployed network environment is challenging. This research concentrates on modelling a memory-based routing model with Stacked Long Short Term Memory (s − LSTM) and Bi-directional Long Short Term Memory (b − LSTM). It is used to hold the routing information and random routing to attain superior performance. The proposed model is trained based on the searching and detection mechanisms to compute the packet delivery ratio (PDR), end-to-end (E2E) delay, throughput,… More >

  • Open Access

    ARTICLE

    Hybrid Authentication Using Node Trustworthy to Detect Vulnerable Nodes

    S. M. Udhaya Sankar1,*, S. Thanga Revathi2, R. Thiagarajan3

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 625-640, 2023, DOI:10.32604/csse.2023.030444 - 16 August 2022

    Abstract An ad-hoc sensor network (ASN) is a group of sensing nodes that transmit data over a wireless link to a target node, direct or indirect, through a series of nodes. ASN becomes a high-risk group for several security exploits due to the sensor node’s limited resources. Internal threats are more challenging to protect against than external attacks. The nodes are grouped, and calculate each node’s trust level. The trust level is the result of combining internal and external trust degrees. Cluster heads (CH) are chosen based on the anticipated trust levels. The communications are then… More >

  • Open Access

    ARTICLE

    Genetic-Chicken Swarm Algorithm for Minimizing Energy in Wireless Sensor Network

    A. Jameer Basha1, S. Aswini1, S. Aarthini1, Yunyoung Nam2,*, Mohamed Abouhawwash3,4

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1451-1466, 2023, DOI:10.32604/csse.2023.025503 - 15 June 2022

    Abstract Wireless Sensor Network (WSN) technology is the real-time application that is growing rapidly as the result of smart environments. Battery power is one of the most significant resources in WSN. For enhancing a power factor, the clustering techniques are used. During the forward of data in WSN, more power is consumed. In the existing system, it works with Load Balanced Clustering Method (LBCM) and provides the lifespan of the network with scalability and reliability. In the existing system, it does not deal with end-to-end delay and delivery of packets. For overcoming these issues in WSN,… More >

  • Open Access

    ARTICLE

    Detailed cadaveric analysis of perivesical lymph nodes in cystectomy specimens

    Muhannad Alsyouf1, Jonathan Maldonado, Laura Denham2, Bonnie Rohweller2, Jason Groegler1, Phillip Stokes1, Mohammad Hajiha1, Akin Amasyali1, Herbert Ruckle1, Brian Hu1

    Canadian Journal of Urology, Vol.29, No.5, pp. 11312-11317, 2022

    Abstract Introduction: Perivesical lymph nodes were added to the 8th edition of American Joint Committee on Cancer (AJCC) staging for bladder cancer. Currently, these nodes are inconsistently evaluated at the time of radical cystectomy. The objective of this study was to provide a detailed anatomic evaluation of perivesical lymph nodes.
    Materials and methods: A radical cystectomy was performed on six un-embalmed cadavers with wide resection of perivesical tissue and meticulous care to separate the pelvic sidewall lymph nodes (e.g. obturator, external iliac) from the bladder and perivesical en-bloc specimen. Perivesical tissue dissection in 2 mm slices was performed… More >

  • Open Access

    ARTICLE

    Network Invulnerability Enhancement Algorithm Based on WSN Closeness Centrality

    Qian Sun1,2, Fengbo Yang1,2, Xiaoyi Wang2,3, Jing Li4,*, Jiping Xu1,2, Huiyan Zhang1,2, Li Wang1,2, Jiabin Yu1,2, Xiao Peng1,2, Ruichao Wang5

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3021-3038, 2022, DOI:10.32604/cmc.2022.029367 - 16 June 2022

    Abstract Wireless Sensor Network (WSN) is an important part of the Internet of Things (IoT), which are used for information exchange and communication between smart objects. In practical applications, WSN lifecycle can be influenced by the unbalanced distribution of node centrality and excessive energy consumption, etc. In order to overcome these problems, a heterogeneous wireless sensor network model with small world characteristics is constructed to balance the centrality and enhance the invulnerability of the network. Also, a new WSN centrality measurement method and a new invulnerability measurement model are proposed based on the WSN data transmission More >

Displaying 11-20 on page 2 of 40. Per Page