Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (251)
  • Open Access

    ARTICLE

    Intrusion Detection System Through Deep Learning in Routing MANET Networks

    Zainab Ali Abbood1,2,*, Doğu Çağdaş Atilla3,4, Çağatay Aydin5

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 269-281, 2023, DOI:10.32604/iasc.2023.035276 - 29 April 2023

    Abstract Deep learning (DL) is a subdivision of machine learning (ML) that employs numerous algorithms, each of which provides various explanations of the data it consumes; mobile ad-hoc networks (MANET) are growing in prominence. For reasons including node mobility, due to MANET’s potential to provide small-cost solutions for real-world contact challenges, decentralized management, and restricted bandwidth, MANETs are more vulnerable to security threats. When protecting MANETs from attack, encryption and authentication schemes have their limits. However, deep learning (DL) approaches in intrusion detection systems (IDS) can adapt to the changing environment of MANETs and allow a… More >

  • Open Access

    ARTICLE

    Coati Optimization-Based Energy Efficient Routing Protocol for Unmanned Aerial Vehicle Communication

    Hanan Abdullah Mengash1, Hamed Alqahtani2, Mohammed Maray3, Mohamed K. Nour4, Radwa Marzouk1, Mohammed Abdullah Al-Hagery5, Heba Mohsen6, Mesfer Al Duhayyim7,*

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 4805-4820, 2023, DOI:10.32604/cmc.2023.037810 - 29 April 2023

    Abstract With the flexible deployment and high mobility of Unmanned Aerial Vehicles (UAVs) in an open environment, they have generated considerable attention in military and civil applications intending to enable ubiquitous connectivity and foster agile communications. The difficulty stems from features other than mobile ad-hoc network (MANET), namely aerial mobility in three-dimensional space and often changing topology. In the UAV network, a single node serves as a forwarding, transmitting, and receiving node at the same time. Typically, the communication path is multi-hop, and routing significantly affects the network’s performance. A lot of effort should be invested… More >

  • Open Access

    ARTICLE

    Real-Time Data Transmission with Data Carrier Support Value in Neighbor Strategic Collection in WSN

    S. Ponnarasi1,*, T. Rajendran2

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 6039-6057, 2023, DOI:10.32604/cmc.2023.035499 - 29 April 2023

    Abstract An efficient trust-aware secure routing and network strategy-based data collection scheme is presented in this paper to enhance the performance and security of wireless sensor networks during data collection. The method first discovers the routes between the data sensors and the sink node. Several factors are considered for each sensor node along the route, including energy, number of neighbours, previous transmissions, and energy depletion ratio. Considering all these variables, the Sink Reachable Support Measure and the Secure Communication Support Measure, the method evaluates two distinct measures. The method calculates the data carrier support value using… More >

  • Open Access

    ARTICLE

    Memory-Occupied Routing Algorithms for Quantum Relay Networks

    Jiangyuan Yao1, Kaiwen Zou2, Zheng Jiang2, Shuhua Weng1, Deshun Li1,*, Yahui Li3, Xingcan Cao4

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5929-5946, 2023, DOI:10.32604/cmc.2023.031284 - 29 April 2023

    Abstract Quantum transmission experiments have shown that the successful transmission rate of entangled quanta in optical fibers decreases exponentially. Although current quantum networks deploy quantum relays to establish long-distance connections, the increase in transmission distance and entanglement switching costs still need to be considered when selecting the next hop. However, most of the existing quantum network models prefer to consider the parameters of the physical layer, which ignore the influence factors of the network layer. In this paper, we propose a meshy quantum network model based on quantum teleportation, which considers both network layer and physical… More >

  • Open Access

    ARTICLE

    Improved QoS-Secure Routing in MANET Using Real-Time Regional ME Feature Approximation

    Y. M. Mahaboob John1,*, G. Ravi2

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3653-3666, 2023, DOI:10.32604/csse.2023.036916 - 03 April 2023

    Abstract Mobile Ad-hoc Network (MANET) routing problems are thoroughly studied several approaches are identified in support of MANET. Improve the Quality of Service (QoS) performance of MANET is achieving higher performance. To reduce this drawback, this paper proposes a new secure routing algorithm based on real-time partial ME (Mobility, energy) approximation. The routing method RRME (Real-time Regional Mobility Energy) divides the whole network into several parts, and each node’s various characteristics like mobility and energy are randomly selected neighbors accordingly. It is done in the path discovery phase, estimated to identify and remove malicious nodes. In… More >

  • Open Access

    ARTICLE

    Energy Based Random Repeat Trust Computation in Delay Tolerant Network

    S. Dheenathayalan*, B. Paramasivan

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 2845-2859, 2023, DOI:10.32604/csse.2023.033326 - 03 April 2023

    Abstract As the use of mobile devices continues to rise, trust administration will significantly improve security in routing the guaranteed quality of service (QoS) supply in Mobile Ad Hoc Networks (MANET) due to the mobility of the nodes. There is no continuance of network communication between nodes in a delay-tolerant network (DTN). DTN is designed to complete recurring connections between nodes. This approach proposes a dynamic source routing protocol (DSR) based on a feed-forward neural network (FFNN) and energy-based random repetition trust calculation in DTN. If another node is looking for a node that swerved off… More >

  • Open Access

    ARTICLE

    Energy-Efficient Clustering Using Optimization with Locust Game Theory

    P. Kavitha Rani1, Hee-Kwon Chae2, Yunyoung Nam2,*, Mohamed Abouhawwash3,4

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2591-2605, 2023, DOI:10.32604/iasc.2023.033697 - 15 March 2023

    Abstract Wireless sensor networks (WSNs) are made up of several sensors located in a specific area and powered by a finite amount of energy to gather environmental data. WSNs use sensor nodes (SNs) to collect and transmit data. However, the power supplied by the sensor network is restricted. Thus, SNs must store energy as often as to extend the lifespan of the network. In the proposed study, effective clustering and longer network lifetimes are achieved using multi-swarm optimization (MSO) and game theory based on locust search (LS-II). In this research, MSO is used to improve the… More >

  • Open Access

    ARTICLE

    Optimized Tuning of LOADng Routing Protocol Parameters for IoT

    Divya Sharma1,*, Sanjay Jain2, Vivek Maik3

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1549-1561, 2023, DOI:10.32604/csse.2023.035031 - 09 February 2023

    Abstract Interconnected devices and intelligent applications have slashed human intervention in the Internet of Things (IoT), making it possible to accomplish tasks with less human interaction. However, it faces many problems, including lower capacity links, energy utilization, enhancement of resources and limited resources due to its openness, heterogeneity, limited resources and extensiveness. It is challenging to route packets in such a constrained environment. In an IoT network constrained by limited resources, minimal routing control overhead is required without packet loss. Such constrained environments can be improved through the optimal routing protocol. It is challenging to route… More >

  • Open Access

    ARTICLE

    Enhanced Metaheuristics with Trust Aware Route Selection for Wireless Sensor Networks

    A. Francis Saviour Devaraj1, T. Satyanarayana Murthy2, Fayadh Alenezi3, E. Laxmi Lydia4, Mohamad Adzhar Md Zawawi5, Mohamad Khairi Ishak5,*

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1431-1445, 2023, DOI:10.32604/csse.2023.034421 - 09 February 2023

    Abstract Recently, a trust system was introduced to enhance security and cooperation between nodes in wireless sensor networks (WSN). In routing, the trust system includes or avoids nodes related to the estimated trust values in the routing function. This article introduces Enhanced Metaheuristics with Trust Aware Secure Route Selection Protocol (EMTA-SRSP) for WSN. The presented EMTA-SRSP technique majorly involves the optimal selection of routes in WSN. To accomplish this, the EMTA-SRSP technique involves the design of an oppositional Aquila optimization algorithm to choose safe routes for data communication. For the clustering process, the nodes with maximum More >

  • Open Access

    ARTICLE

    Efficient Optimal Routing Algorithm Based on Reward and Penalty for Mobile Adhoc Networks

    Anubha1, Ravneet Preet Singh Bedi2, Arfat Ahmad Khan3,*, Mohd Anul Haq4, Ahmad Alhussen5, Zamil S. Alzamil4

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1331-1351, 2023, DOI:10.32604/cmc.2023.033181 - 06 February 2023

    Abstract Mobile adhoc networks have grown in prominence in recent years, and they are now utilized in a broader range of applications. The main challenges are related to routing techniques that are generally employed in them. Mobile Adhoc system management, on the other hand, requires further testing and improvements in terms of security. Traditional routing protocols, such as Adhoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR), employ the hop count to calculate the distance between two nodes. The main aim of this research work is to determine the optimum method for sending packets while… More >

Displaying 61-70 on page 7 of 251. Per Page