Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (212)
  • Open Access

    ARTICLE

    Dynamic Routing of Multiple QoS-Required Flows in Cloud-Edge Autonomous Multi-Domain Data Center Networks

    Shiyan Zhang1,*, Ruohan Xu2, Zhangbo Xu3, Cenhua Yu1, Yuyang Jiang1, Yuting Zhao4

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2287-2308, 2024, DOI:10.32604/cmc.2023.046550

    Abstract The 6th generation mobile networks (6G) network is a kind of multi-network interconnection and multi-scenario coexistence network, where multiple network domains break the original fixed boundaries to form connections and convergence. In this paper, with the optimization objective of maximizing network utility while ensuring flows performance-centric weighted fairness, this paper designs a reinforcement learning-based cloud-edge autonomous multi-domain data center network architecture that achieves single-domain autonomy and multi-domain collaboration. Due to the conflict between the utility of different flows, the bandwidth fairness allocation problem for various types of flows is formulated by considering different defined reward… More >

  • Open Access

    ARTICLE

    Secure and Reliable Routing in the Internet of Vehicles Network: AODV-RL with BHA Attack Defense

    Nadeem Ahmed1,*, Khalid Mohammadani2, Ali Kashif Bashir3,4,5, Marwan Omar6, Angel Jones7, Fayaz Hassan1

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.1, pp. 633-659, 2024, DOI:10.32604/cmes.2023.031342

    Abstract Wireless technology is transforming the future of transportation through the development of the Internet of Vehicles (IoV). However, intricate security challenges are intertwined with technological progress: Vehicular ad hoc Networks (VANETs), a core component of IoV, face security issues, particularly the Black Hole Attack (BHA). This malicious attack disrupts the seamless flow of data and threatens the network’s overall reliability; also, BHA strategically disrupts communication pathways by dropping data packets from legitimate nodes altogether. Recognizing the importance of this challenge, we have introduced a new solution called ad hoc On-Demand Distance Vector-Reputation-based mechanism Local Outlier… More >

  • Open Access

    ARTICLE

    Numerical Simulation of Surrounding Rock Deformation and Grouting Reinforcement of Cross-Fault Tunnel under Different Excavation Methods

    Duan Zhu1,2, Zhende Zhu1,2, Cong Zhang1,2,*, Lun Dai1,2, Baotian Wang1,2

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2445-2470, 2024, DOI:10.32604/cmes.2023.030847

    Abstract Tunnel construction is susceptible to accidents such as loosening, deformation, collapse, and water inrush, especially under complex geological conditions like dense fault areas. These accidents can cause instability and damage to the tunnel. As a result, it is essential to conduct research on tunnel construction and grouting reinforcement technology in fault fracture zones to address these issues and ensure the safety of tunnel excavation projects. This study utilized the Xianglushan cross-fault tunnel to conduct a comprehensive analysis on the construction, support, and reinforcement of a tunnel crossing a fault fracture zone using the three-dimensional finite… More >

  • Open Access

    ARTICLE

    Mitigating Blackhole and Greyhole Routing Attacks in Vehicular Ad Hoc Networks Using Blockchain Based Smart Contracts

    Abdulatif Alabdulatif1,*, Mada Alharbi1, Abir Mchergui2, Tarek Moulahi3,4

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 2005-2022, 2024, DOI:10.32604/cmes.2023.029769

    Abstract The rapid increase in vehicle traffic volume in modern societies has raised the need to develop innovative solutions to reduce traffic congestion and enhance traffic management efficiency. Revolutionary advanced technology, such as Intelligent Transportation Systems (ITS), enables improved traffic management, helps eliminate congestion, and supports a safer environment. ITS provides real-time information on vehicle traffic and transportation systems that can improve decision-making for road users. However, ITS suffers from routing issues at the network layer when utilising Vehicular Ad Hoc Networks (VANETs). This is because each vehicle plays the role of a router in this… More >

  • Open Access

    ARTICLE

    Unweighted Voting Method to Detect Sinkhole Attack in RPL-Based Internet of Things Networks

    Shadi Al-Sarawi1, Mohammed Anbar1,*, Basim Ahmad Alabsi2, Mohammad Adnan Aladaileh3, Shaza Dawood Ahmed Rihan2

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 491-515, 2023, DOI:10.32604/cmc.2023.041108

    Abstract The Internet of Things (IoT) consists of interconnected smart devices communicating and collecting data. The Routing Protocol for Low-Power and Lossy Networks (RPL) is the standard protocol for Internet Protocol Version 6 (IPv6) in the IoT. However, RPL is vulnerable to various attacks, including the sinkhole attack, which disrupts the network by manipulating routing information. This paper proposes the Unweighted Voting Method (UVM) for sinkhole node identification, utilizing three key behavioral indicators: DODAG Information Object (DIO) Transaction Frequency, Rank Harmony, and Power Consumption. These indicators have been carefully selected based on their contribution to sinkhole… More >

  • Open Access

    ARTICLE

    LSTDA: Link Stability and Transmission Delay Aware Routing Mechanism for Flying Ad-Hoc Network (FANET)

    Farman Ali1, Khalid Zaman2, Babar Shah3, Tariq Hussain4, Habib Ullah5, Altaf Hussain5, Daehan Kwak6,*

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 963-981, 2023, DOI:10.32604/cmc.2023.040628

    Abstract The paper presents a new protocol called Link Stability and Transmission Delay Aware (LSTDA) for Flying Ad-hoc Network (FANET) with a focus on network corridors (NC). FANET consists of Unmanned Aerial Vehicles (UAVs) that face challenges in avoiding transmission loss and delay while ensuring stable communication. The proposed protocol introduces a novel link stability with network corridors priority node selection to check and ensure fair communication in the entire network. The protocol uses a Red-Black (R-B) tree to achieve maximum channel utilization and an advanced relay approach. The paper evaluates LSTDA in terms of End-to-End More >

  • Open Access

    ARTICLE

    Evaluation of Pre-Harvest Sprouting (PHS) Resistance and Screening of High-Quality Varieties from Thirty-Seven Quinoa (Chenopodium quinoa Willd.) Resources in Chengdu Plain

    Xin Pan, Ya Gao, Fang Zeng, Chunmei Zheng, Wenxuan Ge, Yan Wan, Yanxia Sun, Xiaoyong Wu*

    Phyton-International Journal of Experimental Botany, Vol.92, No.10, pp. 2921-2936, 2023, DOI:10.32604/phyton.2023.029853

    Abstract Pre-harvest sprouting (PHS) will have a serious effect both on the yield and quality of quinoa (Chenopodium quinoa Willd.). It is crucial to select and breed quinoa varieties with PHS resistance and excellent agronomic traits for guidance production and utilization of quinoa. A comprehensive evaluation of the PHS resistance and agronomic traits of 37 species of quinoa resources was conducted in Chengdu Plain. The evaluation used various methods, including grain germination rate (GR), grain germination index (GI), total spike germination rate (SR), total grain germination index (SI), grey correlation analysis (GCA), cluster analysis and correlation analysis.… More >

  • Open Access

    ARTICLE

    Decision Analysis on IoV Routing Transmission and Energy Efficiency Optimization Algorithm with AmBC

    Baofeng Ji1,2,3,*, Mingkun Zhang1,2, Weixing Wang1, Song Chen4

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.3, pp. 2661-2673, 2023, DOI:10.32604/cmes.2023.028762

    Abstract The improvement of the quality and efficiency of vehicle wireless network data transmission is always a key concern in the Internet of Vehicles (IoV). Routing transmission solved the limitation of transmission distance to a certain extent. Traditional routing algorithm cannot adapt to complex traffic environment, resulting in low transmission efficiency. In order to improve the transmission success rate and quality of vehicle network routing transmission, make the routing algorithm more suitable for complex traffic environment, and reduce transmission power consumption to improve energy efficiency, a comprehensive optimized routing transmission algorithm is proposed. Based on the… More >

  • Open Access

    REVIEW

    Managing Smart Technologies with Software-Defined Networks for Routing and Security Challenges: A Survey

    Babangida Isyaku1,2, Kamalrulnizam Bin Abu Bakar2,*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1839-1879, 2023, DOI:10.32604/csse.2023.040456

    Abstract Smart environments offer various services, including smart cities, e-healthcare, transportation, and wearable devices, generating multiple traffic flows with different Quality of Service (QoS) demands. Achieving the desired QoS with security in this heterogeneous environment can be challenging due to traffic flows and device management, unoptimized routing with resource awareness, and security threats. Software Defined Networks (SDN) can help manage these devices through centralized SDN controllers and address these challenges. Various schemes have been proposed to integrate SDN with emerging technologies for better resource utilization and security. Software Defined Wireless Body Area Networks (SDWBAN) and Software More >

  • Open Access

    ARTICLE

    The Effect of Packet Loss Rate on Multipath Routing for Wireless Multimedia Sensor Network

    Mohammed Abazeed*

    Journal on Internet of Things, Vol.4, No.4, pp. 227-233, 2022, DOI:10.32604/jiot.2022.039598

    Abstract Wireless multimedia sensor networks present unique quality of service and resource management requirements that distinguish them from scalar data in traditional wireless sensor networks. These demands pose a formidable obstacle to sensor nodes, which are resource-constrained and thus require distinct strategies and techniques to operate effectively. Multipath routing improves reliability while conserving the limited resources of sensor nodes. The source node selects the most optimal paths for delivering multimedia packets based on the multi-hop routes. This paper investigates the impact of packet loss on the observed frame rate in multipath routing protocols and evaluates it More >

Displaying 11-20 on page 2 of 212. Per Page