Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (56)
  • Open Access

    ARTICLE

    QoS Constrained Network Coding Technique to Data Transmission Using IoT

    A. Sathishkumar1,*, T. Rammohan2, S. Sathish Kumar3, J. Uma3, K. Srujan Raju4, Aarti Sangwan5, M. Sivachitra6, M. Prabu7

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 531-544, 2022, DOI:10.32604/csse.2022.021694 - 20 April 2022

    Abstract The research work presents, constrained network coding technique to ensure the successful data transmission based composite channel cmos technology using dielectric properties. The charge fragmentation and charge splitting are two components of the filtered switch domino (FSD) technique. Further behavior of selected switching is achieved using generator called conditional pulse generator which is employed in Multi Dynamic Node Domino (MDND) technique. Both FSD and MDND technique need wide area compared to existing single node-keeper domino technique. The aim of this research is to minimize dissipation of power and to achieve less consumption of power. The… More >

  • Open Access

    ARTICLE

    Feedline Separation for Independent Control of Simultaneously Different Tx/Rx Radiation Patterns

    Akarachai Inthanil, Monthippa Uthansakul*, Peerapong Uthansakul

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2221-2241, 2022, DOI:10.32604/cmc.2022.024390 - 29 March 2022

    Abstract The shortcoming of Wi-Fi networks is that one user can access the router at a time. This drawback limits the system throughput and delay. This paper proposes a concept of Simultaneously Different Tx/Rx (SDTR) radiation patterns with only one antenna set at the router. Furthermore, these two patterns have to be simultaneously operated at the same time so that the system delay can be eased. An omni-directional pattern is employed at router for receiving mode so that the router can sense carrier signal from all directions. At the same time, the router launches a directional More >

  • Open Access

    ARTICLE

    A New Handover Management Model for Two-Tier 5G Mobile Networks

    Mohammad Arifin Rahman Khan1,*, Mohammed Golam Kaosar2, Mohammad Shorfuzzaman3, Kire Jakimoski4

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5491-5509, 2022, DOI:10.32604/cmc.2022.024212 - 14 January 2022

    Abstract There has been an exponential rise in mobile data traffic in recent times due to the increasing popularity of portable devices like tablets, smartphones, and laptops. The rapid rise in the use of these portable devices has put extreme stress on the network service providers while forcing telecommunication engineers to look for innovative solutions to meet the increased demand. One solution to the problem is the emergence of fifth-generation (5G) wireless communication, which can address the challenges by offering very broad wireless area capacity and potential cut-power consumption. The application of small cells is the… More >

  • Open Access

    ARTICLE

    BDLR: lncRNA identification using ensemble learning

    LEJUN GONG1,2,*, SHEHAI ZHOU1, JINGMEI CHEN1, YONGMIN LI1, LI ZHANG4, ZHIHONG GAO3

    BIOCELL, Vol.46, No.4, pp. 951-960, 2022, DOI:10.32604/biocell.2022.016625 - 15 December 2021

    Abstract Long non-coding RNAs (lncRNAs) play an important role in many life activities such as epigenetic material regulation, cell cycle regulation, dosage compensation and cell differentiation regulation, and are associated with many human diseases. There are many limitations in identifying and annotating lncRNAs using traditional biological experimental methods. With the development of high-throughput sequencing technology, it is of great practical significance to identify the lncRNAs from massive RNA sequence data using machine learning method. Based on the Bagging method and Decision Tree algorithm in ensemble learning, this paper proposes a method of lncRNAs gene sequence identification More >

  • Open Access

    ARTICLE

    Partially Overlapping Channel Assignment Using Bonded and Non-Bonded Channels in IEEE 802.11n WLAN

    Md. Selim Al Mamun1,2, Fatema Akhter1,*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3161-3178, 2022, DOI:10.32604/cmc.2022.022214 - 07 December 2021

    Abstract Nowadays, wireless local area network (WLAN) has become prevalent Internet access due to its low-cost gadgets, flexible coverage and hassle-free simple wireless installation. WLAN facilitates wireless Internet services to users with mobile devices like smart phones, tablets, and laptops through deployment of multiple access points (APs) in a network field. Every AP operates on a frequency band called channel. Popular wireless standard such as IEEE 802.11n has a limited number of channels where frequency spectrum of adjacent channels overlaps partially with each other. In a crowded environment, users may experience poor Internet services due to… More >

  • Open Access

    ARTICLE

    An Effective Secure MAC Protocol for Cognitive Radio Networks

    Bayan Al-Amri1, Gofran Sami2, Wajdi Alhakami1,*

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 133-148, 2022, DOI:10.32604/csse.2022.021543 - 02 December 2021

    Abstract The vast revolution in networking is increasing rapidly along with technology advancements, which requires more effort from all cyberspace professionals to cope with the challenges that come with advanced technology privileges and services. Hence, Cognitive Radio Network is one of the promising approaches that permit a dynamic type of smart network for improving the utilization of idle spectrum portions of wireless communications. However, it is vulnerable to security threats and attacks and demands security mechanisms to preserve and protect the cognitive radio networks for ensuring a secure communication environment. This paper presents an effective secure More >

  • Open Access

    ARTICLE

    Energy Efficiency Trade-off with Spectral Efficiency in MIMO Systems

    Rao Muhammad Asif1, Mustafa Shakir1, Jamel Nebhen2, Ateeq Ur Rehman3, Muhammad Shafiq4,*, Jin-Ghoo Choi4

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5889-5905, 2022, DOI:10.32604/cmc.2022.020777 - 11 October 2021

    Abstract 5G technology can greatly improve spectral efficiency (SE) and throughput of wireless communications. In this regard, multiple input multiple output (MIMO) technology has become the most influential technology using huge antennas and user equipment (UE). However, the use of MIMO in 5G wireless technology will increase circuit power consumption and reduce energy efficiency (EE). In this regard, this article proposes an optimal solution for weighing SE and throughput tradeoff with energy efficiency. The research work is based on the Wyner model of uplink (UL) and downlink (DL) transmission under the multi-cell model scenario. The SE-EE… More >

  • Open Access

    ARTICLE

    Cross-Layer Hidden Markov Analysis for Intrusion Detection

    K. Venkatachalam1, P. Prabu2, B. Saravana Balaji3, Byeong-Gwon Kang4, Yunyoung Nam4,*, Mohamed Abouhawwash5,6

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3685-3700, 2022, DOI:10.32604/cmc.2022.019502 - 27 September 2021

    Abstract Ad hoc mobile cloud computing networks are affected by various issues, like delay, energy consumption, flexibility, infrastructure, network lifetime, security, stability, data transition, and link accomplishment. Given the issues above, route failure is prevalent in ad hoc mobile cloud computing networks, which increases energy consumption and delay and reduces stability. These issues may affect several interconnected nodes in an ad hoc mobile cloud computing network. To address these weaknesses, which raise many concerns about privacy and security, this study formulated clustering-based storage and search optimization approaches using cross-layer analysis. The proposed approaches were formed by cross-layer analysis based… More >

  • Open Access

    ARTICLE

    Implementation of a High-Speed and High-Throughput Advanced Encryption Standard

    T. Manoj Kumar1,*, P. Karthigaikumar2

    Intelligent Automation & Soft Computing, Vol.31, No.2, pp. 1025-1036, 2022, DOI:10.32604/iasc.2022.020090 - 22 September 2021

    Abstract

    Data security is an essential aspect of data communication and data storage. To provide high-level security against all kinds of unauthorized accesses, cryptographic algorithms have been applied to various fields such as medical and military applications. Advanced Encryption Standard (AES), a symmetric cryptographic algorithm, is acknowledged as the most secure algorithm for the cryptographic process globally. Several modifications have been made to the original architecture after it was proposed by two Belgian researchers, Joan Daemen and Vincent Rijment, at the third AES candidate Conference in 2000. The existing modifications aim to increase security and speed.

    More >

  • Open Access

    ARTICLE

    Performance Analysis and Throughput Enhancement of the STET Technique for WLAN IEEE 802.11ad

    M. Vanitha1,*, J. Kirubakaran2, K. Radhika2

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 571-579, 2022, DOI:10.32604/csse.2022.017663 - 09 September 2021

    Abstract The IEEE 802.11ad innovation has enabled the impact of remote devices in unauthorized 60 GHz unlicensed frequency band at Giga bits per second information transfer rate in speed concentrated 5G applications. We have presented an innovative work that deals with the upgradation of the ability of IEEE 802.11ad wireless LAN to make it suitable for wireless applications. An exact examination on the IEEE 802.11ad analysis has been carried out in this work to achieve the greatest throughput. This has pulled attraction in broad consideration for accomplishing the pinnacle transmission rate of 8 Gbit/s. IEEE 802.11ad… More >

Displaying 31-40 on page 4 of 56. Per Page