Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    ARTICLE

    Enhanced Energy Efficient with a Trust Aware in MANET for Real-Time Applications

    M. V. Narayana1, Vadla Pradeep Kumar2, Ashok Kumar Nanda2,*, Hanumantha Rao Jalla3, Subba Reddy Chavva4

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 587-607, 2023, DOI:10.32604/cmc.2023.034773

    Abstract Mobile ad hoc networks (MANETs) are subjected to attack detection for transmitting and creating new messages or existing message modifications. The attacker on another node evaluates the forging activity in the message directly or indirectly. Every node sends short packets in a MANET environment with its identifier, location on the map, and time through beacons. The attackers on the network broadcast the warning message using faked coordinates, providing the appearance of a network collision. Similarly, MANET degrades the channel utilization performance. Performance highly affects network performance through security algorithms. This paper developed a trust management technique called Enhanced Beacon Trust… More >

  • Open Access

    ARTICLE

    Lens-Oppositional Wild Geese Optimization Based Clustering Scheme for Wireless Sensor Networks Assists Real Time Disaster Management

    R. Surendran1,*, Youseef Alotaibi2, Ahmad F. Subahi3

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 835-851, 2023, DOI:10.32604/csse.2023.036757

    Abstract Recently, wireless sensor networks (WSNs) find their applicability in several real-time applications such as disaster management, military, surveillance, healthcare, etc. The utilization of WSNs in the disaster monitoring process has gained significant attention among research communities and governments. Real-time monitoring of disaster areas using WSN is a challenging process due to the energy-limited sensor nodes. Therefore, the clustering process can be utilized to improve the energy utilization of the nodes and thereby improve the overall functioning of the network. In this aspect, this study proposes a novel Lens-Oppositional Wild Goose Optimization based Energy Aware Clustering (LOWGO-EAC) scheme for WSN-assisted real-time… More >

  • Open Access

    ARTICLE

    Lightweight Network Ensemble Architecture for Environmental Perception on the Autonomous System

    Yingpeng Dai1, Junzheng Wang1, Jing Li1,*, Lingfeng Meng2, Songfeng Wang2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.1, pp. 135-156, 2023, DOI:10.32604/cmes.2022.021525

    Abstract It is important for the autonomous system to understand environmental information. For the autonomous system, it is desirable to have a strong generalization ability to deal with different complex environmental information, as well as have high accuracy and quick inference speed. Network ensemble architecture is a good choice to improve network performance. However, it is unsuitable for real-time applications on the autonomous system. To tackle this problem, a new neural network ensemble named partial-shared ensemble network (PSENet) is presented. PSENet changes network ensemble architecture from parallel architecture to scatter architecture and merges multiple component networks together to accelerate the inference… More >

  • Open Access

    ARTICLE

    Service-Aware Access Control Procedure for Blockchain Assisted Real-Time Applications

    Alaa Omran Almagrabi1,*, A. K. Bashir2

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3649-3667, 2021, DOI:10.32604/cmc.2021.015056

    Abstract The design of distributed ledger, Asymmetric Key Algorithm (AKA) blockchain systems, is prominent in administering security and access control in various real-time services and applications. The assimilation of blockchain systems leverages the reliable access and secure service provisioning of the services. However, the distributed ledger technology’s access control and chained decisions are defaced by pervasive and service unawareness. It results in degrading security through unattended access control for limited-service users. In this article, a service-aware access control procedure (SACP) is introduced to address the afore-mentioned issue. The proposed SACP defines attended access control for all the service session by identifying… More >

Displaying 1-10 on page 1 of 4. Per Page