Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (11)
  • Open Access

    ARTICLE

    Redundant Transmission Control Algorithm for Information-Centric Vehicular IoT Networks

    Abdur Rashid Sangi1,*, Satish Anamalamudi2, Mohammed S. Alkatheiri3, Murali Krishna Enduri2, Anil Carie2, Mohammed A. Alqarni4

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2217-2234, 2023, DOI:10.32604/cmc.2023.038305

    Abstract Vehicular Adhoc Networks (VANETs) enable vehicles to act as mobile nodes that can fetch, share, and disseminate information about vehicle safety, emergency events, warning messages, and passenger infotainment. However, the continuous dissemination of information from vehicles and their one-hop neighbor nodes, Road Side Units (RSUs), and VANET infrastructures can lead to performance degradation of VANETs in the existing host-centric IP-based network. Therefore, Information Centric Networks (ICN) are being explored as an alternative architecture for vehicular communication to achieve robust content distribution in highly mobile, dynamic, and error-prone domains. In ICN-based Vehicular-IoT networks, consumer mobility is implicitly supported, but producer mobility… More >

  • Open Access

    ARTICLE

    Novel Double Modular Redundancy Based Fault-Tolerant FIR Filter for Image Denoising

    V. S. Vaisakhi1,*, D. Surendran2

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 181-193, 2023, DOI:10.32604/csse.2023.032514

    Abstract In signal processing and communication systems, digital filters are widely employed. In some circumstances, the reliability of those systems is crucial, necessitating the use of fault tolerant filter implementations. Many strategies have been presented throughout the years to achieve fault tolerance by utilising the structure and properties of the filters. As technology advances, more complicated systems with several filters become possible. Some of the filters in those complicated systems frequently function in parallel, for example, by applying the same filter to various input signals. Recently, a simple strategy for achieving fault tolerance that takes advantage of the availability of parallel… More >

  • Open Access

    ARTICLE

    Multi-Objective Redundancy Optimization of Continuous-Point Robot Milling Path in Shipbuilding

    Jianjun Yao*, Chen Qian, Yikun Zhang, Geyang Yu

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.2, pp. 1283-1303, 2023, DOI:10.32604/cmes.2022.021328

    Abstract The 6-DOF manipulator provides a new option for traditional shipbuilding for its advantages of vast working space, low power consumption, and excellent flexibility. However, the rotation of the end effector along the tool axis is functionally redundant when using a robotic arm for five-axis machining. In the process of ship construction, the performance of the parts’ protective coating needs to be machined to meet the Performance Standard of Protective Coatings (PSPC). The arbitrary redundancy configuration in path planning will result in drastic fluctuations in the robot joint angle, greatly reducing machining quality and efficiency. There have been some studies on… More >

  • Open Access

    ARTICLE

    Coverage Control for Underwater Sensor Networks Based on Residual Energy Probability

    Jinglin Liang1,2, Qian Sun1,2,*, Xiaoyi Wang3,2, Jiping Xu1,2, Huiyan Zhang1,2, Li Wang1,2, Jiabin Yu1,2, Jing Li4, Ruichao Wang5

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5459-5471, 2022, DOI:10.32604/cmc.2022.029362

    Abstract Underwater sensor networks have important application value in the fields of water environment data collection, marine environment monitoring and so on. It has some characteristics such as low available bandwidth, large propagation delays and limited energy, which bring new challenges to the current researches. The research on coverage control of underwater sensor networks is the basis of other related researches. A good sensor node coverage control method can effectively improve the quality of water environment monitoring. Aiming at the problem of high dynamics and uncertainty of monitoring targets, the random events level are divided into serious events and general events.… More >

  • Open Access

    ARTICLE

    Data De-Duplication Process and Authentication Using ERCE with Poisson Filter in Cloud Data Storage

    B. Venkatesan1,*, S. Chitra2

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1603-1615, 2022, DOI:10.32604/iasc.2022.026049

    Abstract The cloud storage is essential environment for users to access high confidential data. Every single data is most valued by users. If we count, day by day information as well as, memory storage are increasing gradually. Cost of memory will increase when data increases with demand for storage. At present data duplication or redundant data storing in the cloud became hard for storage provider. Also, it makes security issue if repeated data from various users stored in the server. It makes data duplication, which is very efficient for intruders. Also, when same data stored in cloud, there will be a… More >

  • Open Access

    ARTICLE

    Latent Semantic Based Fuzzy Kernel Support Vector Machine for Automatic Content Summarization

    T. Vetriselvi1,*, J. Albert Mayan2, K. V. Priyadharshini3, K. Sathyamoorthy4, S. Venkata Lakshmi5, P. Vishnu Raja6

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1537-1551, 2022, DOI:10.32604/iasc.2022.025235

    Abstract Recently, the bounteous amount of data/information has been available on the Internet which makes it very complicated to the customers to calculate the preferred data. Because the huge amount of data in a system is mandated to discover the most proper data from the corpus. Content summarization selects and extracts the related sentence depends upon the calculation of the score and rank of the corpus. Automatic content summarization technique translates from the higher corpus into smaller concise description. This chooses the very important level of the texts and implements the complete statistics summary. This paper proposes the novel technique that… More >

  • Open Access

    ARTICLE

    MRMR Based Feature Vector Design for Efficient Citrus Disease Detection

    Bobbinpreet1, Sultan Aljahdali2,*, Tripti Sharma1, Bhawna Goyal1, Ayush Dogra3, Shubham Mahajan4, Amit Kant Pandit4

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 4771-4787, 2022, DOI:10.32604/cmc.2022.023150

    Abstract In recent times, the images and videos have emerged as one of the most important information source depicting the real time scenarios. Digital images nowadays serve as input for many applications and replacing the manual methods due to their capabilities of 3D scene representation in 2D plane. The capabilities of digital images along with utilization of machine learning methodologies are showing promising accuracies in many applications of prediction and pattern recognition. One of the application fields pertains to detection of diseases occurring in the plants, which are destroying the widespread fields. Traditionally the disease detection process was done by a… More >

  • Open Access

    ARTICLE

    Pattern Analysis and Regressive Linear Measure for Botnet Detection

    B. Padmavathi1,2,*, B. Muthukumar3

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 119-139, 2022, DOI:10.32604/csse.2022.021431

    Abstract Capturing the distributed platform with remotely controlled compromised machines using botnet is extensively analyzed by various researchers. However, certain limitations need to be addressed efficiently. The provisioning of detection mechanism with learning approaches provides a better solution more broadly by saluting multi-objective constraints. The bots’ patterns or features over the network have to be analyzed in both linear and non-linear manner. The linear and non-linear features are composed of high-level and low-level features. The collected features are maintained over the Bag of Features (BoF) where the most influencing features are collected and provided into the classifier model. Here, the linearity… More >

  • Open Access

    ARTICLE

    COCP: Coupling Parameters Content Placement Strategy for In-Network Caching-Based Content-Centric Networking

    Salman Rashid1, Shukor Abd Razak1, Fuad A. Ghaleb1,*, Faisal Saeed2, Eman H. Alkhammash3

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5523-5543, 2022, DOI:10.32604/cmc.2022.020587

    Abstract On-path caching is the prominent module in Content-Centric Networking (CCN), equipped with the capability to handle the demands of future networks such as the Internet of Things (IoT) and vehicular networks. The main focus of the CCN caching module is data dissemination within the network. Most of the existing strategies of in-network caching in CCN store the content at the maximum number of routers along the downloading path. Consequently, content redundancy in the network increases significantly, whereas the cache hit ratio and network performance decrease due to the unnecessary utilization of limited cache storage. Moreover, content redundancy adversely affects the… More >

  • Open Access

    REVIEW

    Optimization of Reliability–Redundancy Allocation Problems: A Review of the Evolutionary Algorithms

    Haykel Marouani1,2, Omar Al-mutiri1,*

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 537-571, 2022, DOI:10.32604/cmc.2022.020098

    Abstract The study of optimization methods for reliability–redundancy allocation problems is a constantly changing field. New algorithms are continually being designed on the basis of observations of nature, wildlife, and humanity. In this paper, we review eight major evolutionary algorithms that emulate the behavior of civilization, ants, bees, fishes, and birds (i.e., genetic algorithms, bee colony optimization, simulated annealing, particle swarm optimization, biogeography-based optimization, artificial immune system optimization, cuckoo algorithm and imperialist competitive algorithm). We evaluate the mathematical formulations and pseudo-codes of each algorithm and discuss how these apply to reliability–redundancy allocation problems. Results from a literature survey show the best… More >

Displaying 1-10 on page 1 of 11. Per Page