Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (205)
  • Open Access

    ARTICLE

    Differential Evolution with Arithmetic Optimization Algorithm Enabled Multi-Hop Routing Protocol

    Manar Ahmed Hamza1,*, Haya Mesfer Alshahrani2, Sami Dhahbi3, Mohamed K Nour4, Mesfer Al Duhayyim5, ElSayed M. Tag El Din6, Ishfaq Yaseen1, Abdelwahed Motwakel1

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1759-1773, 2023, DOI:10.32604/csse.2023.030581

    Abstract Wireless Sensor Networks (WSN) has evolved into a key technology for ubiquitous living and the domain of interest has remained active in research owing to its extensive range of applications. In spite of this, it is challenging to design energy-efficient WSN. The routing approaches are leveraged to reduce the utilization of energy and prolonging the lifespan of network. In order to solve the restricted energy problem, it is essential to reduce the energy utilization of data, transmitted from the routing protocol and improve network development. In this background, the current study proposes a novel Differential Evolution with Arithmetic Optimization Algorithm… More >

  • Open Access

    ARTICLE

    Internet of Things Enabled Energy Aware Metaheuristic Clustering for Real Time Disaster Management

    Riya Kumarasamy Santhanaraj1, Surendran Rajendran2,*, Carlos Andres Tavera Romero3, Sadish Sendil Murugaraj4

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1561-1576, 2023, DOI:10.32604/csse.2023.029463

    Abstract Wireless Sensor Networks (WSNs) are a major element of Internet of Things (IoT) networks which offer seamless sensing and wireless connectivity. Disaster management in smart cities can be considered as a safety critical application. Therefore, it becomes essential in ensuring network accessibility by improving the lifetime of IoT assisted WSN. Clustering and multihop routing are considered beneficial solutions to accomplish energy efficiency in IoT networks. This article designs an IoT enabled energy aware metaheuristic clustering with routing protocol for real time disaster management (EAMCR-RTDM). The proposed EAMCR-RTDM technique mainly intends to manage the energy utilization of nodes with the consideration… More >

  • Open Access

    ARTICLE

    Experimental Study of Moso Bamboo to-Steel Connections with Embedded Grouting Materials

    Shidong Nie1,2, Wei Fu1,2, Hui Wang1,2,*, Di Wu1,2,3, Min Liu1,2, Junlong Wang4

    Journal of Renewable Materials, Vol.11, No.3, pp. 1401-1423, 2023, DOI:10.32604/jrm.2022.023446

    Abstract Moso bamboos have attracted excessive attention as a renewable green building material to the concept of sustainable development. In this paper, the 20 bolted Moso bamboo connection specimens with embedded steel plates and grouting materials were designed according to connection configurations with different bolt diameters and end distance of bolt holes, and their bearing capacities and failure modes were analyzed by static tension tests. According to the test results of all connectors, the failure modes of the specimens are divided into four categories, and the effects of bolt diameter and bolt hole end distance on the connection bearing capacity and… More >

  • Open Access

    ARTICLE

    Efficient Origin-Destination Estimation Using Microscopic Traffic Simulation with Restricted Rerouting

    Kazuki Abe1,*, Hideki Fujii2, Shinobu Yoshimura2

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.2, pp. 1091-1109, 2023, DOI:10.32604/cmes.2022.021376

    Abstract Traffic simulators are utilized to solve a variety of traffic-related problems. For such simulators, origin-destination (OD) traffic volumes as mobility demands are required to input, and we need to estimate them. The authors regard an OD estimation as a bi-level programming problem, and apply a microscopic traffic simulation model to it. However, the simulation trials can be computationally expensive if full dynamic rerouting is allowed, when employing multi-agent-based models in the estimation process. This paper proposes an efficient OD estimation method using a multi-agent-based simulator with restricted dynamic rerouting to reduce the computational load. Even though, in the case of… More >

  • Open Access

    ARTICLE

    Region Centric GL Feature Approximation Based Secure Routing for Improved QoS in MANET

    S. Soundararajan1, R. Prabha2, M. Baskar3,*, T. J. Nagalakshmi4

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 267-280, 2023, DOI:10.32604/iasc.2023.032239

    Abstract Secure routing in Mobile Adhoc Network (Manet) is the key issue now a day in providing secure access to different network services. As mobile devices are used in accessing different services, performing secure routing becomes a challenging task. Towards this, different approaches exist which find the trusted route based on their previous transmission details and behavior of different nodes. Also, the methods focused on trust measurement based on tiny information obtained from local nodes or with global information which are incomplete. However, the adversary nodes are more capable and participate in each transmission not just to steal the data also… More >

  • Open Access

    ARTICLE

    Cluster Head Selection and Multipath Routing Based Energy Efficient Wireless Sensor Network

    T. Shanmugapriya1,*, Dr. K. Kousalya2

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 879-894, 2023, DOI:10.32604/iasc.2023.032074

    Abstract The Wireless Sensor Network (WSN) is a network of Sensor Nodes (SN) which adopt radio signals for communication amongst themselves. There is an increase in the prominence of WSN adaptability to emerging applications like the Internet of Things (IoT) and Cyber-Physical Systems (CPS). Data security, detection of faults, management of energy, collection and distribution of data, network protocol, network coverage, mobility of nodes, and network heterogeneity are some of the issues confronted by WSNs. There is not much published information on issues related to node mobility and management of energy at the time of aggregation of data. Towards the goal… More >

  • Open Access

    ARTICLE

    Combined Linear Multi-Model for Reliable Route Recommender in Next Generation Network

    S. Kalavathi1,*, R. Nedunchelian2

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 39-56, 2023, DOI:10.32604/iasc.2023.031522

    Abstract Network analysis is a promising field in the area of network applications as different types of traffic grow enormously and exponentially. Reliable route prediction is a challenging task in the Large Scale Networks (LSN). Various non-self-learning and self-learning approaches have been adopted to predict reliable routing. Routing protocols decide how to send all the packets from source to the destination addresses across the network through their IP. In the current era, dynamic protocols are preferred as they network self-learning internally using an algorithm and may not entail being updated physically more than the static protocols. A novel method named Reliable… More >

  • Open Access

    ARTICLE

    Mobility Aware Zone-Based Routing in Vehicle Ad hoc Networks Using Hybrid Metaheuristic Algorithm

    C. Nandagopal1,*, P. Siva Kumar2, R. Rajalakshmi3, S. Anandamurugan4

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 113-126, 2023, DOI:10.32604/iasc.2023.031103

    Abstract Vehicle Ad hoc Networks (VANETs) have high mobility and a randomized connection structure, resulting in extremely dynamic behavior. Several challenges, such as frequent connection failures, sustainability, multi-hop data transfer, and data loss, affect the effectiveness of Transmission Control Protocols (TCP) on such wireless ad hoc networks. To avoid the problem, in this paper, mobility-aware zone-based routing in VANET is proposed. To achieve this concept, in this paper hybrid optimization algorithm is presented. The hybrid algorithm is a combination of Ant colony optimization (ACO) and artificial bee colony optimization (ABC). The proposed hybrid algorithm is designed for the routing process which… More >

  • Open Access

    ARTICLE

    Blockchain Driven Metaheuristic Route Planning in Secure Wireless Sensor Networks

    M. V. Rajesh1, T. Archana Acharya2, Hafis Hajiyev3, E. Laxmi Lydia4, Haya Mesfer Alshahrani5, Mohamed K Nour6, Abdullah Mohamed7, Mesfer Al Duhayyim8,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 933-949, 2023, DOI:10.32604/cmc.2023.032549

    Abstract Recently, Internet of Things (IoT) has been developed into a field of research and it purposes at linking many sensors enabling devices mostly to data collection and track applications. Wireless sensor network (WSN) is a vital element of IoT paradigm since its inception and has developed into one of the chosen platforms for deploying many smart city application regions such as disaster management, intelligent transportation, home automation, smart buildings, and other such IoT-based application. The routing approaches were extremely-utilized energy efficient approaches with an initial drive that is, for balancing the energy amongst sensor nodes. The clustering and routing procedures… More >

  • Open Access

    ARTICLE

    Secure and Optimal LOADng Routing for IoT with Composite Routing Metric

    Divya Sharma1,*, Sanjay Jain2, Vivek Maik3

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 655-669, 2023, DOI:10.32604/cmc.2023.032207

    Abstract Security is the one of the major challenges for routing the data between the source and destination in an Internet of Things (IoT) network. To overcome this challenge, a secure Lightweight On-demand Ad hoc Distance-vector—Next Generation (LOADng) Routing Protocol is proposed in this paper. As the LOADng protocol is the second version of Ad Hoc On-Demand Distance Vector (AODV) protocol, it retains most of the basic functionality and characteristics of AODV. During the route discovery process, the cyclic shift transposition algorithm (CSTA) is used to encrypt the control packets of the LOADng protocol to improve its security. CSTA approach only… More >

Displaying 41-50 on page 5 of 205. Per Page