Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (40)
  • Open Access

    ARTICLE

    Optimal Deployment of Heterogeneous Nodes to Enhance Network Invulnerability

    Qian Sun1,2, Fengbo Yang1,2, Xiaoyi Wang2,3,*, Jiping Xu1,2, Huiyan Zhang1,2, Li Wang1,2, Jiabin Yu1,2, Xiao Peng1,2, Ruichao Wang4

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3081-3097, 2022, DOI:10.32604/cmc.2022.029366 - 16 June 2022

    Abstract Wireless sensor networks (WSN) can be used in many fields. In wireless sensor networks, sensor nodes transmit data in multi hop mode. The large number of hops required by data transmission will lead to unbalanced energy consumption and large data transmission delay of the whole network, which greatly affects the invulnerability of the network. Therefore, an optimal deployment of heterogeneous nodes (ODHN) algorithm is proposed to enhance the invulnerability of the wireless sensor networks. The algorithm combines the advantages of DEEC (design of distributed energy efficient clustering) clustering algorithm and BAS (beetle antenna search) optimization More >

  • Open Access

    ARTICLE

    Hybrid Cloud Security by Revocable KUNodes-Storage with Identity-Based Encryption

    S. Saravanakumar1,*, S. Chitra2

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 985-996, 2022, DOI:10.32604/csse.2022.019508 - 09 May 2022

    Abstract Cloud storage is a service involving cloud service providers providing storage space to customers. Cloud storage services have numerous advantages, including convenience, high computation, and capacity, thereby attracting users to outsource data in the cloud. However, users outsource data directly via cloud stage services that are unsafe when outsourcing data is sensitive for users. Therefore, cipher text-policy attribute-based encryption is a promising cryptographic solution in a cloud environment, and can be drawn up for access control by data owners (DO) to define access policy. Unfortunately, an outsourced architecture applied with attribute-based encryption introduces numerous challenges, More >

  • Open Access

    ARTICLE

    QoS Constrained Network Coding Technique to Data Transmission Using IoT

    A. Sathishkumar1,*, T. Rammohan2, S. Sathish Kumar3, J. Uma3, K. Srujan Raju4, Aarti Sangwan5, M. Sivachitra6, M. Prabu7

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 531-544, 2022, DOI:10.32604/csse.2022.021694 - 20 April 2022

    Abstract The research work presents, constrained network coding technique to ensure the successful data transmission based composite channel cmos technology using dielectric properties. The charge fragmentation and charge splitting are two components of the filtered switch domino (FSD) technique. Further behavior of selected switching is achieved using generator called conditional pulse generator which is employed in Multi Dynamic Node Domino (MDND) technique. Both FSD and MDND technique need wide area compared to existing single node-keeper domino technique. The aim of this research is to minimize dissipation of power and to achieve less consumption of power. The… More >

  • Open Access

    ARTICLE

    Energy Efficient Clustering and Optimized LOADng Protocol for IoT

    Divya Sharma1,*, Sanjay Jain2, Vivek Maik3

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 357-370, 2022, DOI:10.32604/iasc.2022.025637 - 15 April 2022

    Abstract In recent years, the use of Internet of Things (IoT) devices has increased exponentially due to the advancement of information and communication technologies. Wireless sensor networks (WSNs) are vital in the development of IoT and include low-cost smart devices for data collection. However, such smart devices hold some restrictions in terms of calculation, processing, storage, and energy resources. With such constraints, one of the primary difficulties for the WSN is to achieve the lowest possible energy consumption across the network. This article aims to develop an Energy-Efficient cluster-based Lightweight On-Demand Ad hoc Distance Vector Routing… More >

  • Open Access

    ARTICLE

    Fault Pattern Diagnosis and Classification in Sensor Nodes Using Fall Curve

    Mudita Uppal1, Deepali Gupta1, Divya Anand2, Fahd S. Alharithi3, Jasem Almotiri3, Arturo Mansilla4,5, Dinesh Singh6, Nitin Goyal1,*

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1799-1814, 2022, DOI:10.32604/cmc.2022.025330 - 24 February 2022

    Abstract The rapid expansion of Internet of Things (IoT) devices deploys various sensors in different applications like homes, cities and offices. IoT applications depend upon the accuracy of sensor data. So, it is necessary to predict faults in the sensor and isolate their cause. A novel primitive technique named fall curve is presented in this paper which characterizes sensor faults. This technique identifies the faulty sensor and determines the correct working of the sensor. Different sources of sensor faults are explained in detail whereas various faults that occurred in sensor nodes available in IoT devices are… More >

  • Open Access

    ARTICLE

    Exploration of IoT Nodes Communication Using LoRaWAN in Forest Environment

    Anshul Sharma1, Divneet Singh Kapoor1, Anand Nayyar2,3,*, Basit Qureshi4, Kiran Jot Singh1, Khushal Thakur1

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 6239-6256, 2022, DOI:10.32604/cmc.2022.024639 - 14 January 2022

    Abstract The simultaneous advances in the Internet of Things (IoT), Artificial intelligence (AI) and Robotics is going to revolutionize our world in the near future. In recent years, LoRa (Long Range) wireless powered by LoRaWAN (LoRa Wide Area Network) protocol has attracted the attention of researchers for numerous applications in the IoT domain. LoRa is a low power, unlicensed Industrial, Scientific, and Medical (ISM) band-equipped wireless technology that utilizes a wide area network protocol, i.e., LoRaWAN, to incorporate itself into the network infrastructure. In this paper, we have evaluated the LoRaWAN communication protocol for the implementation of… More >

  • Open Access

    ARTICLE

    Complex Network Formation and Analysis of Online Social Media Systems

    Hafiz Abid Mahmood Malik*

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.3, pp. 1737-1750, 2022, DOI:10.32604/cmes.2022.018015 - 30 December 2021

    Abstract To discover and identify the influential nodes in any complex network has been an important issue. It is a significant factor in order to control over the network. Through control on a network, any information can be spread and stopped in a short span of time. Both targets can be achieved, since network of information can be extended and as well destroyed. So, information spread and community formation have become one of the most crucial issues in the world of SNA (Social Network Analysis). In this work, the complex network of twitter social network has… More >

  • Open Access

    ARTICLE

    Design and Simulation of Ring Network-on-Chip for Different Configured Nodes

    Arpit Jain1, Rakesh Kumar Dwivedi1, Hammam Alshazly2,*, Adesh Kumar3, Sami Bourouis4, Manjit Kaur5

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 4085-4100, 2022, DOI:10.32604/cmc.2022.023017 - 07 December 2021

    Abstract The network-on-chip (NoC) technology is frequently referred to as a front-end solution to a back-end problem. The physical substructure that transfers data on the chip and ensures the quality of service begins to collapse when the size of semiconductor transistor dimensions shrinks and growing numbers of intellectual property (IP) blocks working together are integrated into a chip. The system on chip (SoC) architecture of today is so complex that not utilizing the crossbar and traditional hierarchical bus architecture. NoC connectivity reduces the amount of hardware required for routing and functions, allowing SoCs with NoC interconnect… More >

  • Open Access

    ARTICLE

    Mobile Fog Computing by Using SDN/NFV on 5G Edge Nodes

    G. R. Sreekanth1,*, S. Ahmed Najat Ahmed2, Marko Sarac3, Ivana Strumberger3, Nebojsa Bacanin3, Miodrag Zivkovic3

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 751-765, 2022, DOI:10.32604/csse.2022.020534 - 25 October 2021

    Abstract Fog computing provides quality of service for cloud infrastructure. As the data computation intensifies, edge computing becomes difficult. Therefore, mobile fog computing is used for reducing traffic and the time for data computation in the network. In previous studies, software-defined networking (SDN) and network functions virtualization (NFV) were used separately in edge computing. Current industrial and academic research is tackling to integrate SDN and NFV in different environments to address the challenges in performance, reliability, and scalability. SDN/NFV is still in development. The traditional Internet of things (IoT) data analysis system is only based on… More >

  • Open Access

    ARTICLE

    Visualizing Complex Anatomical Structure in Bamboo Nodes Based on X-ray Microtomography

    Elin Xiang1,2, Shumin Yang1,*, Chunjie Cao3, Xinge Liu1, Guanyun Peng4, Lili Shang1, Genlin Tian1, Qianli Ma1, Jianfeng Ma1

    Journal of Renewable Materials, Vol.9, No.9, pp. 1531-1540, 2021, DOI:10.32604/jrm.2021.015346 - 23 April 2021

    Abstract In recent years, bamboo has been widely used in a broad range of applications, a thorough understanding of the structural characteristics of bamboo nodes is essential for better processing and manufacturing of biomimetic materials. This study investigated the complex anatomical structure for the nodes of two bamboo species, Indocalamus latifolius (Keng) McClure and Shibataea chinensis Nakai, using a high-resolution X-ray microtomography (μCT). The results show that the vascular bundle system in the nodal region of I. latifolius and S. chinensis is a net-like structure composed of horizontal and axial vascular bundles. Furthermore, the fiber sheath surrounding metaxylem vessels tended More >

Displaying 21-30 on page 3 of 40. Per Page