Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (52)
  • Open Access

    ARTICLE

    Partially Overlapping Channel Assignment Using Bonded and Non-Bonded Channels in IEEE 802.11n WLAN

    Md. Selim Al Mamun1,2, Fatema Akhter1,*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3161-3178, 2022, DOI:10.32604/cmc.2022.022214 - 07 December 2021

    Abstract Nowadays, wireless local area network (WLAN) has become prevalent Internet access due to its low-cost gadgets, flexible coverage and hassle-free simple wireless installation. WLAN facilitates wireless Internet services to users with mobile devices like smart phones, tablets, and laptops through deployment of multiple access points (APs) in a network field. Every AP operates on a frequency band called channel. Popular wireless standard such as IEEE 802.11n has a limited number of channels where frequency spectrum of adjacent channels overlaps partially with each other. In a crowded environment, users may experience poor Internet services due to… More >

  • Open Access

    ARTICLE

    An Effective Secure MAC Protocol for Cognitive Radio Networks

    Bayan Al-Amri1, Gofran Sami2, Wajdi Alhakami1,*

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 133-148, 2022, DOI:10.32604/csse.2022.021543 - 02 December 2021

    Abstract The vast revolution in networking is increasing rapidly along with technology advancements, which requires more effort from all cyberspace professionals to cope with the challenges that come with advanced technology privileges and services. Hence, Cognitive Radio Network is one of the promising approaches that permit a dynamic type of smart network for improving the utilization of idle spectrum portions of wireless communications. However, it is vulnerable to security threats and attacks and demands security mechanisms to preserve and protect the cognitive radio networks for ensuring a secure communication environment. This paper presents an effective secure More >

  • Open Access

    ARTICLE

    Energy Efficiency Trade-off with Spectral Efficiency in MIMO Systems

    Rao Muhammad Asif1, Mustafa Shakir1, Jamel Nebhen2, Ateeq Ur Rehman3, Muhammad Shafiq4,*, Jin-Ghoo Choi4

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5889-5905, 2022, DOI:10.32604/cmc.2022.020777 - 11 October 2021

    Abstract 5G technology can greatly improve spectral efficiency (SE) and throughput of wireless communications. In this regard, multiple input multiple output (MIMO) technology has become the most influential technology using huge antennas and user equipment (UE). However, the use of MIMO in 5G wireless technology will increase circuit power consumption and reduce energy efficiency (EE). In this regard, this article proposes an optimal solution for weighing SE and throughput tradeoff with energy efficiency. The research work is based on the Wyner model of uplink (UL) and downlink (DL) transmission under the multi-cell model scenario. The SE-EE… More >

  • Open Access

    ARTICLE

    Cross-Layer Hidden Markov Analysis for Intrusion Detection

    K. Venkatachalam1, P. Prabu2, B. Saravana Balaji3, Byeong-Gwon Kang4, Yunyoung Nam4,*, Mohamed Abouhawwash5,6

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3685-3700, 2022, DOI:10.32604/cmc.2022.019502 - 27 September 2021

    Abstract Ad hoc mobile cloud computing networks are affected by various issues, like delay, energy consumption, flexibility, infrastructure, network lifetime, security, stability, data transition, and link accomplishment. Given the issues above, route failure is prevalent in ad hoc mobile cloud computing networks, which increases energy consumption and delay and reduces stability. These issues may affect several interconnected nodes in an ad hoc mobile cloud computing network. To address these weaknesses, which raise many concerns about privacy and security, this study formulated clustering-based storage and search optimization approaches using cross-layer analysis. The proposed approaches were formed by cross-layer analysis based… More >

  • Open Access

    ARTICLE

    Implementation of a High-Speed and High-Throughput Advanced Encryption Standard

    T. Manoj Kumar1,*, P. Karthigaikumar2

    Intelligent Automation & Soft Computing, Vol.31, No.2, pp. 1025-1036, 2022, DOI:10.32604/iasc.2022.020090 - 22 September 2021

    Abstract

    Data security is an essential aspect of data communication and data storage. To provide high-level security against all kinds of unauthorized accesses, cryptographic algorithms have been applied to various fields such as medical and military applications. Advanced Encryption Standard (AES), a symmetric cryptographic algorithm, is acknowledged as the most secure algorithm for the cryptographic process globally. Several modifications have been made to the original architecture after it was proposed by two Belgian researchers, Joan Daemen and Vincent Rijment, at the third AES candidate Conference in 2000. The existing modifications aim to increase security and speed.

    More >

  • Open Access

    ARTICLE

    Performance Analysis and Throughput Enhancement of the STET Technique for WLAN IEEE 802.11ad

    M. Vanitha1,*, J. Kirubakaran2, K. Radhika2

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 571-579, 2022, DOI:10.32604/csse.2022.017663 - 09 September 2021

    Abstract The IEEE 802.11ad innovation has enabled the impact of remote devices in unauthorized 60 GHz unlicensed frequency band at Giga bits per second information transfer rate in speed concentrated 5G applications. We have presented an innovative work that deals with the upgradation of the ability of IEEE 802.11ad wireless LAN to make it suitable for wireless applications. An exact examination on the IEEE 802.11ad analysis has been carried out in this work to achieve the greatest throughput. This has pulled attraction in broad consideration for accomplishing the pinnacle transmission rate of 8 Gbit/s. IEEE 802.11ad… More >

  • Open Access

    ARTICLE

    High Throughput Scheduling Algorithms for Input Queued Packet Switches

    R. Chithra Devi1,*, D. Jemi Florinabel2, Narayanan Prasanth3

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1527-1540, 2022, DOI:10.32604/cmc.2022.019343 - 07 September 2021

    Abstract The high-performance computing paradigm needs high-speed switching fabrics to meet the heavy traffic generated by their applications. These switching fabrics are efficiently driven by the deployed scheduling algorithms. In this paper, we proposed two scheduling algorithms for input queued switches whose operations are based on ranking procedures. At first, we proposed a Simple 2-Bit (S2B) scheme which uses binary ranking procedure and queue size for scheduling the packets. Here, the Virtual Output Queue (VOQ) set with maximum number of empty queues receives higher rank than other VOQ’s. Through simulation, we showed S2B has better throughput More >

  • Open Access

    ARTICLE

    Resource Allocation for Throughput Maximization in Cognitive Radio Network with NOMA

    Xiaoli He1, Yu Song2,3,*, Yu Xue4, Muhammad Owais5, Weijian Yang1, Xinwen Cheng1

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 195-212, 2022, DOI:10.32604/cmc.2022.017105 - 07 September 2021

    Abstract Spectrum resources are the precious and limited natural resources. In order to improve the utilization of spectrum resources and maximize the network throughput, this paper studies the resource allocation of the downlink cognitive radio network with non-orthogonal multiple access (CRN-NOMA). NOMA, as the key technology of the fifth-generation communication (5G), can effectively increase the capacity of 5G networks. The optimization problem proposed in this paper aims to maximize the number of secondary users (SUs) accessing the system and the total throughput in the CRN-NOMA. Under the constraints of total power, minimum rate, interference and SINR,… More >

  • Open Access

    ARTICLE

    Computational high-throughput screening and in vitro approaches identify CB-006-3; A novel PI3K-BRAFV600E dual targeted inhibitor against melanoma

    FAISAL HASSAN TOBEIGEI1, REEM M. GAHTANI2, AHMAD SHAIKH2, AMER AL ALI3, NADER KAMELI4,5, HOSSAM KAMLI2, PRASANNA RAJAGOPALAN2,6,*

    Oncology Research, Vol.29, No.5, pp. 305-318, 2021, DOI:10.32604/or.2022.025187 - 10 October 2022

    Abstract Malignant melanoma is characterized by both genetic and molecular alterations that activate phosphoinositide 3-kinase (PI3K), and RAS/BRAF pathways. In this work, through diversity-based high-throughput virtual screening we identified a lead molecule that selectively targets PI3K and BRAFV600E kinases. Computational screening, Molecular dynamics simulation and MMPBSA calculations were performed. PI3K and BRAFV600E kinase inhibition was done. A375 and G-361 cells were used for in vitro cellular analysis to determine antiproliferative effects, annexin V binding, nuclear fragmentation and cell cycle analysis. Computational screening of small molecules indicates compound CB-006-3 selectively targets PI3KCG (gamma subunit), PI3KCD (delta subunit) and BRAFV600E. Molecular… More >

  • Open Access

    ARTICLE

    ANN Based Novel Approach to Detect Node Failure in Wireless Sensor Network

    Sundresan Perumal1, Mujahid Tabassum1, Ganthan Narayana2, Suresh Ponnan3,*, Chinmay Chakraborty4, Saju Mohanan5, Zeeshan Basit5, Mohammad Tabrez Quasim6

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1447-1462, 2021, DOI:10.32604/cmc.2021.014854 - 21 July 2021

    Abstract A wireless sensor network (WSN) consists of several tiny sensor nodes to monitor, collect, and transmit the physical information from an environment through the wireless channel. The node failure is considered as one of the main issues in the WSN which creates higher packet drop, delay, and energy consumption during the communication. Although the node failure occurred mostly due to persistent energy exhaustion during transmission of data packets. In this paper, Artificial Neural Network (ANN) based Node Failure Detection (NFD) is developed with cognitive radio for detecting the location of the node failure. The ad hocMore >

Displaying 31-40 on page 4 of 52. Per Page