Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (48)
  • Open Access

    ARTICLE

    Cross-Layer Hidden Markov Analysis for Intrusion Detection

    K. Venkatachalam1, P. Prabu2, B. Saravana Balaji3, Byeong-Gwon Kang4, Yunyoung Nam4,*, Mohamed Abouhawwash5,6

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3685-3700, 2022, DOI:10.32604/cmc.2022.019502

    Abstract Ad hoc mobile cloud computing networks are affected by various issues, like delay, energy consumption, flexibility, infrastructure, network lifetime, security, stability, data transition, and link accomplishment. Given the issues above, route failure is prevalent in ad hoc mobile cloud computing networks, which increases energy consumption and delay and reduces stability. These issues may affect several interconnected nodes in an ad hoc mobile cloud computing network. To address these weaknesses, which raise many concerns about privacy and security, this study formulated clustering-based storage and search optimization approaches using cross-layer analysis. The proposed approaches were formed by cross-layer analysis based on intrusion… More >

  • Open Access

    ARTICLE

    Implementation of a High-Speed and High-Throughput Advanced Encryption Standard

    T. Manoj Kumar1,*, P. Karthigaikumar2

    Intelligent Automation & Soft Computing, Vol.31, No.2, pp. 1025-1036, 2022, DOI:10.32604/iasc.2022.020090

    Abstract

    Data security is an essential aspect of data communication and data storage. To provide high-level security against all kinds of unauthorized accesses, cryptographic algorithms have been applied to various fields such as medical and military applications. Advanced Encryption Standard (AES), a symmetric cryptographic algorithm, is acknowledged as the most secure algorithm for the cryptographic process globally. Several modifications have been made to the original architecture after it was proposed by two Belgian researchers, Joan Daemen and Vincent Rijment, at the third AES candidate Conference in 2000. The existing modifications aim to increase security and speed. This paper proposes an efficient… More >

  • Open Access

    ARTICLE

    Performance Analysis and Throughput Enhancement of the STET Technique for WLAN IEEE 802.11ad

    M. Vanitha1,*, J. Kirubakaran2, K. Radhika2

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 571-579, 2022, DOI:10.32604/csse.2022.017663

    Abstract The IEEE 802.11ad innovation has enabled the impact of remote devices in unauthorized 60 GHz unlicensed frequency band at Giga bits per second information transfer rate in speed concentrated 5G applications. We have presented an innovative work that deals with the upgradation of the ability of IEEE 802.11ad wireless LAN to make it suitable for wireless applications. An exact examination on the IEEE 802.11ad analysis has been carried out in this work to achieve the greatest throughput. This has pulled attraction in broad consideration for accomplishing the pinnacle transmission rate of 8 Gbit/s. IEEE 802.11ad is a convention utilized for… More >

  • Open Access

    ARTICLE

    High Throughput Scheduling Algorithms for Input Queued Packet Switches

    R. Chithra Devi1,*, D. Jemi Florinabel2, Narayanan Prasanth3

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1527-1540, 2022, DOI:10.32604/cmc.2022.019343

    Abstract The high-performance computing paradigm needs high-speed switching fabrics to meet the heavy traffic generated by their applications. These switching fabrics are efficiently driven by the deployed scheduling algorithms. In this paper, we proposed two scheduling algorithms for input queued switches whose operations are based on ranking procedures. At first, we proposed a Simple 2-Bit (S2B) scheme which uses binary ranking procedure and queue size for scheduling the packets. Here, the Virtual Output Queue (VOQ) set with maximum number of empty queues receives higher rank than other VOQ’s. Through simulation, we showed S2B has better throughput performance than Highest Ranking First… More >

  • Open Access

    ARTICLE

    Resource Allocation for Throughput Maximization in Cognitive Radio Network with NOMA

    Xiaoli He1, Yu Song2,3,*, Yu Xue4, Muhammad Owais5, Weijian Yang1, Xinwen Cheng1

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 195-212, 2022, DOI:10.32604/cmc.2022.017105

    Abstract Spectrum resources are the precious and limited natural resources. In order to improve the utilization of spectrum resources and maximize the network throughput, this paper studies the resource allocation of the downlink cognitive radio network with non-orthogonal multiple access (CRN-NOMA). NOMA, as the key technology of the fifth-generation communication (5G), can effectively increase the capacity of 5G networks. The optimization problem proposed in this paper aims to maximize the number of secondary users (SUs) accessing the system and the total throughput in the CRN-NOMA. Under the constraints of total power, minimum rate, interference and SINR, CRN-NOMA throughput is maximized by… More >

  • Open Access

    ARTICLE

    ANN Based Novel Approach to Detect Node Failure in Wireless Sensor Network

    Sundresan Perumal1, Mujahid Tabassum1, Ganthan Narayana2, Suresh Ponnan3,*, Chinmay Chakraborty4, Saju Mohanan5, Zeeshan Basit5, Mohammad Tabrez Quasim6

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1447-1462, 2021, DOI:10.32604/cmc.2021.014854

    Abstract A wireless sensor network (WSN) consists of several tiny sensor nodes to monitor, collect, and transmit the physical information from an environment through the wireless channel. The node failure is considered as one of the main issues in the WSN which creates higher packet drop, delay, and energy consumption during the communication. Although the node failure occurred mostly due to persistent energy exhaustion during transmission of data packets. In this paper, Artificial Neural Network (ANN) based Node Failure Detection (NFD) is developed with cognitive radio for detecting the location of the node failure. The ad hoc on-demand distance vector (AODV)… More >

  • Open Access

    ARTICLE

    Identification of Polymorphic Markers by High-Resolution Melting (HRM) Assay for High-Throughput SNP Genotyping in Maize

    Zhigang Shang1,2, Yongzhe Zhu3, Xinmei Guo1,2, Meiai Zhao1,4,*

    Phyton-International Journal of Experimental Botany, Vol.90, No.6, pp. 1711-1725, 2021, DOI:10.32604/phyton.2021.015048

    Abstract The development of next generation sequencing (NGS) and high throughput genotyping are important techniques for the QTL mapping and genetic analysis of different crops. High-resolution melting (HRM) is an emerging technology used for detecting single-nucleotide polymorphisms (SNPs) in various species. However, its use is still limited in maize. The HRM analysis was integrated with SNPs to identify three types of populations (NIL population, RIL population and natural population), and the useful tags were screened. The patterns of temperature-shifted melting curves were investigated from the HRM analysis, and compared these with the kit. Among all 48 pairs of primers, 10 pairs… More >

  • Open Access

    ARTICLE

    Maximizing Throughput in Wireless Multimedia Sensor Network using Soft Computing Techniques

    Krishnan Muthumayil1,*, Thangaiyan Jayasankar2, Nagappan Krishnaraj3, Mohamed Yacin Sikkandar4, Prakash Nattanmai Balasubramanian5, Chokkalingam Bharatiraja6

    Intelligent Automation & Soft Computing, Vol.27, No.3, pp. 771-784, 2021, DOI:10.32604/iasc.2021.012462

    Abstract Wireless Multimedia Sensor Networks (WMSN) provides valuable information for scalar data, images, audio, and video processing in monitoring and surveillance applications. Multimedia streaming, however, is highly challenging for networks as energy restriction sensor nodes limit the potential data transmission bandwidth and lead to reduced throughput. WMSN’s two key design challenges, which can be achieved by the clustering process, are energy efficiency and throughput maximization. The use of the clustering technique helps to organise the sensor nodes into clusters, and between each cluster a cluster head (CH) will be chosen. This paper introduces a new Artificial Fish Swarm Optimization Algorithm (AFSA)… More >

  • Open Access

    ARTICLE

    Transcriptome based high-throughput SSRs and SNPs discovery in the medicinal plant Lagenaria siceraria

    HONGYUAN ZHANG, MIN ZHANG, JIE TAN, SHUPING HUANG, GUOLIN ZHOU*, XIA CHEN*

    BIOCELL, Vol.45, No.2, pp. 371-386, 2021, DOI:10.32604/biocell.2021.013869

    Abstract Lagenaria siceraria (Molina) Standley has unique biological characteristics with high nutritional and medicinal values. It is an important pharmaceutical plant with various biologically active ingredients. Genetic improvement and deeper genomic studies require a rich resource of molecular markers. The application of next-generation sequencing technology, especially for transcriptome profiling, has greatly facilitated high throughput single nucleotide polymorphism (SNP) and simple sequence repeat (SSR) discovery. In this study, we sequenced the transcriptome of three major cultivars of L. siceraria and obtained 64.88 GB of clean data. The assembled high-quality reads were clustered into 89,347 unigenes, which were annotated by non-redundant protein database,… More >

  • Open Access

    ARTICLE

    Efficient Algorithms for Cache-Throughput Analysis in Cellular-D2D 5G Networks

    Nasreen Anjum1,*, Zhaohui Yang1, Imran Khan2, Mahreen Kiran3, Falin Wu4, Khaled Rabie5, Shikh Muhammad Bahaei1

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 1759-1780, 2021, DOI:10.32604/cmc.2021.014635

    Abstract In this paper, we propose a two-tiered segment-based Device-to-Device (S-D2D) caching approach to decrease the startup and playback delay experienced by Video-on-Demand (VoD) users in a cellular network. In the S-D2D caching approach cache space of each mobile device is divided into two cache-blocks. The first cache-block reserve for caching and delivering the beginning portion of the most popular video files and the second cache-block caches the latter portion of the requested video files ‘fully or partially’ depending on the users’ video watching behaviour and popularity of videos. In this approach before caching, video is divided and grouped in a… More >

Displaying 31-40 on page 4 of 48. Per Page