Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (48)
  • Open Access

    ARTICLE

    Cooperative NOMA Based on OAM Transmission for Beyond 5G Applications

    Mohammad Alkhawatrah*

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1187-1197, 2023, DOI:10.32604/csse.2023.030699

    Abstract Cooperative non-orthogonal multiple access (NOMA) is heavily studied in the literature as a solution for 5G and beyond 5G applications. Cooperative NOMA transmits a superimposed version of all users’ messages simultaneously with the aid of a relay, after that, each user decodes its own message. Accordingly, NOMA is deemed as a spectral efficient technique. Another emerging technique exploits orbital angular momentum (OAM), where OAM is an attractive character of electromagnetic waves. OAM gathered a great deal of attention in recent years (similar to the case with NOMA) due to its ability to enhance electromagnetic spectrum exploitation, hence increasing the achieved… More >

  • Open Access

    ARTICLE

    Central Aggregator Intrusion Detection System for Denial of Service Attacks

    Sajjad Ahmad1, Imran Raza1, M. Hasan Jamal1, Sirojiddin Djuraev2, Soojung Hur3, Imran Ashraf3,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2363-2377, 2023, DOI:10.32604/cmc.2023.032694

    Abstract Vehicle-to-grid technology is an emerging field that allows unused power from Electric Vehicles (EVs) to be used by the smart grid through the central aggregator. Since the central aggregator is connected to the smart grid through a wireless network, it is prone to cyber-attacks that can be detected and mitigated using an intrusion detection system. However, existing intrusion detection systems cannot be used in the vehicle-to-grid network because of the special requirements and characteristics of the vehicle-to-grid network. In this paper, the effect of denial-of-service attacks of malicious electric vehicles on the central aggregator of the vehicle-to-grid network is investigated… More >

  • Open Access

    ARTICLE

    Quantifying Solid Solution Strengthening in Nickel-Based Superalloys via High-Throughput Experiment and Machine Learning

    Zihang Li1,#, Zexin Wang1,#, Zi Wang2, Zijun Qin1, Feng Liu1, Liming Tan1,*, Xiaochao Jin3,*, Xueling Fan3, Lan Huang1

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.2, pp. 1521-1538, 2023, DOI:10.32604/cmes.2022.021639

    Abstract Solid solution strengthening (SSS) is one of the main contributions to the desired tensile properties of nickel-based superalloys for turbine blades and disks. The value of SSS can be calculated by using Fleischer’s and Labusch’s theories, while the model parameters are incorporated without fitting to experimental data of complex alloys. In this work, four diffusion multiples consisting of multicomponent alloys and pure Ni are prepared and characterized. The composition and microhardness of single γ phase regions in samples are used to quantify the SSS. Then, Fleischer’s and Labusch’s theories are examined based on high-throughput experiments, respectively. The fitted solid solution… More >

  • Open Access

    ARTICLE

    Computational high-throughput screening and in vitro approaches identify CB-006-3; A novel PI3K-BRAFV600E dual targeted inhibitor against melanoma

    FAISAL HASSAN TOBEIGEI1, REEM M. GAHTANI2, AHMAD SHAIKH2, AMER AL ALI3, NADER KAMELI4,5, HOSSAM KAMLI2, PRASANNA RAJAGOPALAN2,6,*

    Oncology Research, Vol.29, No.5, pp. 305-318, 2021, DOI:10.32604/or.2022.025187

    Abstract Malignant melanoma is characterized by both genetic and molecular alterations that activate phosphoinositide 3-kinase (PI3K), and RAS/BRAF pathways. In this work, through diversity-based high-throughput virtual screening we identified a lead molecule that selectively targets PI3K and BRAFV600E kinases. Computational screening, Molecular dynamics simulation and MMPBSA calculations were performed. PI3K and BRAFV600E kinase inhibition was done. A375 and G-361 cells were used for in vitro cellular analysis to determine antiproliferative effects, annexin V binding, nuclear fragmentation and cell cycle analysis. Computational screening of small molecules indicates compound CB-006-3 selectively targets PI3KCG (gamma subunit), PI3KCD (delta subunit) and BRAFV600E. Molecular dynamics simulation… More >

  • Open Access

    ARTICLE

    Solar Energy Harvesting Using a Timer-Based Relay Selection

    Raed Alhamad1,*, Hatem Boujemaa2

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 2149-2159, 2023, DOI:10.32604/cmc.2023.033222

    Abstract In this paper, the throughput and delay of cooperative communications are derived when solar energy is used and relay node is selected using a timer. The source and relays harvest energy from sun using a photo voltaic system. The harvested power is used by the source to transmit data to the relays. Then, a selected relay amplifies the signal to the destination. Opportunistic, partial and reactive relay selection are used. The relay transmits when its timer elapses. The timer is set to a value proportional to the inverse of its Signal to Noise Ratio (SNR). Therefore, the relay with largest… More >

  • Open Access

    ARTICLE

    Multiway Relay Based Framework for Network Coding in Multi-Hop WSNs

    Vinod Kumar Menaria1, Anand Nayyar2, Sandeep Kumar3, Ketan Kotecha4,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1199-1216, 2023, DOI:10.32604/cmc.2023.032162

    Abstract In today’s information technology (IT) world, the multi-hop wireless sensor networks (MHWSNs) are considered the building block for the Internet of Things (IoT) enabled communication systems for controlling everyday tasks of organizations and industry to provide quality of service (QoS) in a stipulated time slot to end-user over the Internet. Smart city (SC) is an example of one such application which can automate a group of civil services like automatic control of traffic lights, weather prediction, surveillance, etc., in our daily life. These IoT-based networks with multi-hop communication and multiple sink nodes provide efficient communication in terms of performance parameters… More >

  • Open Access

    ARTICLE

    Efficient Clustering Using Memetic Adaptive Hill Climbing Algorithm in WSN

    M. Manikandan1,*, S. Sakthivel2, V. Vivekanandhan1

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3169-3185, 2023, DOI:10.32604/iasc.2023.029232

    Abstract Wireless Sensor Networks are composed of autonomous sensing devices which are interconnected to form a closed network. This closed network is intended to share sensitive location-centric information from a source node to the base station through efficient routing mechanisms. The efficiency of the sensor node is energy bounded, acts as a concentrated area for most researchers to offer a solution for the early draining power of sensors. Network management plays a significant role in wireless sensor networks, which was obsessed with the factors like the reliability of the network, resource management, energy-efficient routing, and scalability of services. The topology of… More >

  • Open Access

    ARTICLE

    Cooperative Relay Networks Based on the OAM Technique for 5G Applications

    Mohammad Alkhawatrah, Ahmad Alamayreh, Nidal Qasem*

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 1911-1919, 2023, DOI:10.32604/csse.2023.028614

    Abstract Orbital Angular Momentum (OAM) is an intrinsic property of electromagnetic waves. Great research has been witnessed in the last decades aiming at exploiting the OAM wave property in different areas in radio and optics. One promising area of particular interest is to enhance the efficiency of the available communications spectrum. However, adopting OAM-based solutions is not priceless as these suffer from wave divergence especially when the OAM order is high. This shall limit the practical communications distance, especially in the radio regime. In this paper, we propose a cooperative OAM relaying system consisting of a source, relay, and destination. Relays… More >

  • Open Access

    ARTICLE

    Throughput Enhancement for NOMA Systems Using Intelligent Reflecting Surfaces

    Raed Alhamad1,*, Hatem Boujemaa2

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5233-5244, 2022, DOI:10.32604/cmc.2022.030793

    Abstract In this article, we optimize the powers associated to Non Orthogonal Multiple Access (NOMA) users, sensing and harvesting duration for Cognitive Radio Networks (CRN). The secondary source harvests energy from node A signal. Then, it senses the channel to detect primary source. Then, the secondary source transmits a signal that is reflected by Intelligent Reflecting Surfaces (IRS) so that all reflections have a zero phase at any user. A set Ii of reflectors are associated to user Ui. The use of M = Mi = 512, 256, 128, 64, 32, 16, 8 reflectors per user offers 45, 42, 39, 36, 33, 30, 27 dB gain… More >

  • Open Access

    ARTICLE

    CLEC: Combination Locality Based Erasure Code for Permissioned Blockchain Storage

    Jiabin Wu1,3, Boai Yang2, Yang Liu1, Fang Liu3,*, Nong Xiao1, Shuo Li4

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5137-5150, 2022, DOI:10.32604/cmc.2022.028305

    Abstract Building a new decentralized domain name system based on blockchain technology is helping to solve problems, such as load imbalance and over-dependence on the trust of the central node. However, in the existing blockchain storage system, the storage overhead is very high due to its full-replication data storage mechanism. The total storage consumption for each block is up to O(n) with n nodes. Erasure code applied to blockchains can significantly reduce the storage overhead, but also greatly lower the read performance. In this study, we propose a novel coding scheme for blockchain storage, Combination Locality based Erasure Code for Permissioned… More >

Displaying 11-20 on page 2 of 48. Per Page