Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (69)
  • Open Access

    ARTICLE

    Multivariate Aggregated NOMA for Resource Aware Wireless Network Communication Security

    V. Sridhar1, K.V. Ranga Rao2, Saddam Hussain3,*, Syed Sajid Ullah4, Roobaea Alroobaea5, Maha Abdelhaq6, Raed Alsaqour7

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1693-1708, 2023, DOI:10.32604/cmc.2023.028129

    Abstract Nonorthogonal Multiple Access (NOMA) is incorporated into the wireless network systems to achieve better connectivity, spectral and energy effectiveness, higher data transfer rate, and also obtain the high quality of services (QoS). In order to improve throughput and minimum latency, a Multivariate Renkonen Regressive Weighted Preference Bootstrap Aggregation based Nonorthogonal Multiple Access (MRRWPBA-NOMA) technique is introduced for network communication. In the downlink transmission, each mobile device's resources and their characteristics like energy, bandwidth, and trust are measured. Followed by, the Weighted Preference Bootstrap Aggregation is applied to recognize the resource-efficient mobile devices for aware data transmission by constructing the different… More >

  • Open Access

    ARTICLE

    Generative Adversarial Networks for Secure Data Transmission in Wireless Network

    E. Jayabalan*, R. Pugazendi

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3757-3784, 2023, DOI:10.32604/iasc.2023.031200

    Abstract In this paper, a communication model in cognitive radios is developed and uses machine learning to learn the dynamics of jamming attacks in cognitive radios. It is designed further to make their transmission decision that automatically adapts to the transmission dynamics to mitigate the launched jamming attacks. The generative adversarial learning neural network (GALNN) or generative dynamic neural network (GDNN) automatically learns with the synthesized training data (training) with a generator and discriminator type neural networks that encompass minimax game theory. The elimination of the jamming attack is carried out with the assistance of the defense strategies and with an… More >

  • Open Access

    REVIEW

    6G-Enabled Internet of Things: Vision, Techniques, and Open Issues

    Mehdi Hosseinzadeh1, Atefeh Hemmati2, Amir Masoud Rahmani3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.133, No.3, pp. 509-556, 2022, DOI:10.32604/cmes.2022.021094

    Abstract There are changes in the development of wireless technology systems every decade. 6G (sixth generation) wireless networks improve on previous generations by increasing dependability, accelerating networks, increasing available bandwidth, decreasing latency, and increasing data transmission speed to standardize communication signals. The purpose of this article is to comprehend the current directions in 6G studies and their relationship to the Internet of Things (IoT). Also, this paper discusses the impacts of 6G on IoT, critical requirements and trends for 6G-enabled IoT, new service classes of 6G and IoT technologies, and current 6G-enabled IoT studies selected by the systematic literature review (SLR)… More >

  • Open Access

    ARTICLE

    Wireless Network Security Using Load Balanced Mobile Sink Technique

    Reem Alkanhel1, Mohamed Abouhawwash2,3, S. N. Sangeethaa4, K. Venkatachalam5, Doaa Sami Khafaga6,*

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2135-2149, 2023, DOI:10.32604/iasc.2023.028852

    Abstract Real-time applications based on Wireless Sensor Network (WSN) technologies are quickly increasing due to intelligent surroundings. Among the most significant resources in the WSN are battery power and security. Clustering strategies improve the power factor and secure the WSN environment. It takes more electricity to forward data in a WSN. Though numerous clustering methods have been developed to provide energy consumption, there is indeed a risk of unequal load balancing, resulting in a decrease in the network’s lifetime due to network inequalities and less security. These possibilities arise due to the cluster head’s limited life span. These cluster heads (CH)… More >

  • Open Access

    ARTICLE

    Hybrid Deep Learning-Based Adaptive Multiple Access Schemes Underwater Wireless Networks

    D. Anitha1,*, R. A. Karthika2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2463-2477, 2023, DOI:10.32604/iasc.2023.023361

    Abstract Achieving sound communication systems in Under Water Acoustic (UWA) environment remains challenging for researchers. The communication scheme is complex since these acoustic channels exhibit uneven characteristics such as long propagation delay and irregular Doppler shifts. The development of machine and deep learning algorithms has reduced the burden of achieving reliable and good communication schemes in the underwater acoustic environment. This paper proposes a novel intelligent selection method between the different modulation schemes such as Code Division Multiple Access(CDMA), Time Division Multiple Access(TDMA), and Orthogonal Frequency Division Multiplexing(OFDM) techniques using the hybrid combination of the convolutional neural networks(CNN) and ensemble single… More >

  • Open Access

    ARTICLE

    An Improved Handoff Algorithm for Heterogeneous Wireless Networks

    Deepak Dahiya1, Payal Mahajan2,*, Zaheeruddin2, Mamta Dahiya3

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3433-3453, 2022, DOI:10.32604/cmc.2022.026676

    Abstract Heterogeneous Wireless Network is currently a major area of focus in communication engineering. But the important issue in recent communication is the approachability to the wireless networks while maintaining the quality of service. Today, all the wireless access networks are working in tandem to keep the users always connected to the internet cloud that matches the price affordability and performance goals. In order to achieve seamless connectivity, due consideration has to be given to handoff precision and a smaller number of handoffs. Several researchers have used heuristic approaches to solve this issue. In the present work, a hybrid intelligent algorithm… More >

  • Open Access

    ARTICLE

    Blockchain Enabled Metaheuristic Cluster Based Routing Model for Wireless Networks

    R.M. Bhavadharini1,*, S. Karthik2

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1233-1250, 2023, DOI:10.32604/csse.2023.025461

    Abstract With recent advancements made in wireless communication techniques, wireless sensors have become an essential component in both data collection as well as tracking applications. Wireless Sensor Network (WSN) is an integral part of Internet of Things (IoT) and it encounters different kinds of security issues. Blockchain is designed as a game changer for highly secure and effective digital society. So, the current research paper focuses on the design of Metaheuristic-based Clustering with Routing Protocol for Blockchain-enabled WSN abbreviated as MCRP-BWSN. The proposed MCRP-BWSN technique aims at deriving a shared memory scheme using blockchain technology and determine the optimal paths to… More >

  • Open Access

    ARTICLE

    Data Aggregation-based Transmission Method in Ultra-Dense Wireless Networks

    Dae-Young Kim, Seokhoon Kim*

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 727-737, 2023, DOI:10.32604/iasc.2023.027563

    Abstract As the Internet of Things (IoT) advances, machine-type devices are densely deployed and massive networks such as ultra-dense networks (UDNs) are formed. Various devices attend to the network to transmit data using machine-type communication (MTC), whereby numerous, various are generated. MTC devices generally have resource constraints and use wireless communication. In this kind of network, data aggregation is a key function to provide transmission efficiency. It can reduce the number of transmitted data in the network, and this leads to energy saving and reducing transmission delays. In order to effectively operate data aggregation in UDNs, it is important to select… More >

  • Open Access

    ARTICLE

    Metaheuristics Based Node Localization Approach for Real-Time Clustered Wireless Networks

    R. Bhaskaran1, P. S. Sujith Kumar2, G. Shanthi3, L. Raja4, Gyanendra Prasad Joshi5, Woong Cho6,*

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 1-17, 2023, DOI:10.32604/csse.2023.024973

    Abstract In recent times, real time wireless networks have found their applicability in several practical applications such as smart city, healthcare, surveillance, environmental monitoring, etc. At the same time, proper localization of nodes in real time wireless networks helps to improve the overall functioning of networks. This study presents an Improved Metaheuristics based Energy Efficient Clustering with Node Localization (IM-EECNL) approach for real-time wireless networks. The proposed IM-EECNL technique involves two major processes namely node localization and clustering. Firstly, Chaotic Water Strider Algorithm based Node Localization (CWSANL) technique to determine the unknown position of the nodes. Secondly, an Oppositional Archimedes Optimization… More >

  • Open Access

    ARTICLE

    Full Duplex Media Access Control Protocol for Multihop Network Computing

    J. Avila Selvi Therase1,*, S. Allwin1, A. Ahilan2

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 297-309, 2023, DOI:10.32604/csse.2023.023515

    Abstract Intelligent communication technologies beyond the network are proposed by using a new full-duplex protocol. The Media Access Control (MAC) is a data interaction network protocol, which outperforms the IEEE 802.15.4e. This research discusses the planning and execution of full-duplex (FD) pipeline MAC protocol for multihop wireless networks (MWN). The design uses a combination of Radio frequency and baseband methods to realize full-duplexing with smallest impact on cross layer functions. The execution and trial results specify that Pipeline Media Access Control (PiMAC) protocol considerably develops network implementation in terms of transmission protocol (TP) and transmission delay. The advantage of using FD-MAC… More >

Displaying 11-20 on page 2 of 69. Per Page