Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (62)
  • Open Access

    ARTICLE

    Improved Network Validity Using Various Soft Computing Techniques

    M. Yuvaraju*, R. Elakkiyavendan

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1465-1477, 2023, DOI:10.32604/iasc.2023.032417 - 05 January 2023

    Abstract Nowadays, when a life span of sensor nodes are threatened by the shortage of energy available for communication, sink mobility is an excellent technique for increasing its lifespan. When communicating via a WSN, the use of nodes as a transmission method eliminates the need for a physical medium. Sink mobility in a dynamic network topology presents a problem for sensor nodes that have reserved resources. Unless the route is revised and changed to reflect the location of the mobile sink location, it will be inefficient for delivering data effectively. In the clustering strategy, nodes are… More >

  • Open Access

    ARTICLE

    Energy-Efficient Routing Protocol with Multi-Hop Fuzzy Logic for Wireless Networks

    J. Gobinath1,*, S. Hemajothi2, J. S. Leena Jasmine3

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 2457-2471, 2023, DOI:10.32604/iasc.2023.031171 - 05 January 2023

    Abstract A Wireless Sensor Network (WSN) becomes a newer type of real-time embedded device that can be utilized for a wide range of applications that make regular networking which appears impracticable. Concerning the energy production of the nodes, WSN has major issues that may influence the stability of the system. As a result, constructing WSN requires devising protocols and standards that make the most use of constrained capacity, especially the energy resources. WSN faces some issues with increased power utilization and an on going development due to the uneven energy usage between the nodes. Clustering has… More >

  • Open Access

    ARTICLE

    Optimal Resource Allocation for NOMA Wireless Networks

    Fahad R. Albogamy1, M. A. Aiyashi2, Fazirul Hisyam Hashim3, Imran Khan4, Bong Jun Choi5,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3249-3261, 2023, DOI:10.32604/cmc.2023.031673 - 31 October 2022

    Abstract The non-orthogonal multiple access (NOMA) method is a novel multiple access technique that aims to increase spectral efficiency (SE) and accommodate enormous user accesses. Multi-user signals are superimposed and transmitted in the power domain at the transmitting end by actively implementing controllable interference information, and multi-user detection algorithms, such as successive interference cancellation (SIC), are performed at the receiving end to demodulate the necessary user signals. Although its basic signal waveform, like LTE baseline, could be based on orthogonal frequency division multiple access (OFDMA) or discrete Fourier transform (DFT)-spread OFDM, NOMA superimposes numerous users in… More >

  • Open Access

    ARTICLE

    Hybrid Deep Learning-Based Adaptive Multiple Access Schemes Underwater Wireless Networks

    D. Anitha1,*, R. A. Karthika2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2463-2477, 2023, DOI:10.32604/iasc.2023.023361 - 19 July 2022

    Abstract Achieving sound communication systems in Under Water Acoustic (UWA) environment remains challenging for researchers. The communication scheme is complex since these acoustic channels exhibit uneven characteristics such as long propagation delay and irregular Doppler shifts. The development of machine and deep learning algorithms has reduced the burden of achieving reliable and good communication schemes in the underwater acoustic environment. This paper proposes a novel intelligent selection method between the different modulation schemes such as Code Division Multiple Access(CDMA), Time Division Multiple Access(TDMA), and Orthogonal Frequency Division Multiplexing(OFDM) techniques using the hybrid combination of the convolutional More >

  • Open Access

    ARTICLE

    Blockchain Enabled Metaheuristic Cluster Based Routing Model for Wireless Networks

    R.M. Bhavadharini1,*, S. Karthik2

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1233-1250, 2023, DOI:10.32604/csse.2023.025461 - 15 June 2022

    Abstract With recent advancements made in wireless communication techniques, wireless sensors have become an essential component in both data collection as well as tracking applications. Wireless Sensor Network (WSN) is an integral part of Internet of Things (IoT) and it encounters different kinds of security issues. Blockchain is designed as a game changer for highly secure and effective digital society. So, the current research paper focuses on the design of Metaheuristic-based Clustering with Routing Protocol for Blockchain-enabled WSN abbreviated as MCRP-BWSN. The proposed MCRP-BWSN technique aims at deriving a shared memory scheme using blockchain technology and… More >

  • Open Access

    ARTICLE

    Data Aggregation-based Transmission Method in Ultra-Dense Wireless Networks

    Dae-Young Kim, Seokhoon Kim*

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 727-737, 2023, DOI:10.32604/iasc.2023.027563 - 06 June 2022

    Abstract As the Internet of Things (IoT) advances, machine-type devices are densely deployed and massive networks such as ultra-dense networks (UDNs) are formed. Various devices attend to the network to transmit data using machine-type communication (MTC), whereby numerous, various are generated. MTC devices generally have resource constraints and use wireless communication. In this kind of network, data aggregation is a key function to provide transmission efficiency. It can reduce the number of transmitted data in the network, and this leads to energy saving and reducing transmission delays. In order to effectively operate data aggregation in UDNs, More >

  • Open Access

    ARTICLE

    Metaheuristics Based Node Localization Approach for Real-Time Clustered Wireless Networks

    R. Bhaskaran1, P. S. Sujith Kumar2, G. Shanthi3, L. Raja4, Gyanendra Prasad Joshi5, Woong Cho6,*

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 1-17, 2023, DOI:10.32604/csse.2023.024973 - 01 June 2022

    Abstract In recent times, real time wireless networks have found their applicability in several practical applications such as smart city, healthcare, surveillance, environmental monitoring, etc. At the same time, proper localization of nodes in real time wireless networks helps to improve the overall functioning of networks. This study presents an Improved Metaheuristics based Energy Efficient Clustering with Node Localization (IM-EECNL) approach for real-time wireless networks. The proposed IM-EECNL technique involves two major processes namely node localization and clustering. Firstly, Chaotic Water Strider Algorithm based Node Localization (CWSANL) technique to determine the unknown position of the nodes. More >

  • Open Access

    ARTICLE

    Full Duplex Media Access Control Protocol for Multihop Network Computing

    J. Avila Selvi Therase1,*, S. Allwin1, A. Ahilan2

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 297-309, 2023, DOI:10.32604/csse.2023.023515 - 01 June 2022

    Abstract Intelligent communication technologies beyond the network are proposed by using a new full-duplex protocol. The Media Access Control (MAC) is a data interaction network protocol, which outperforms the IEEE 802.15.4e. This research discusses the planning and execution of full-duplex (FD) pipeline MAC protocol for multihop wireless networks (MWN). The design uses a combination of Radio frequency and baseband methods to realize full-duplexing with smallest impact on cross layer functions. The execution and trial results specify that Pipeline Media Access Control (PiMAC) protocol considerably develops network implementation in terms of transmission protocol (TP) and transmission delay.… More >

  • Open Access

    ARTICLE

    Signature-Based Intrusion Detection System in Wireless 6G IoT Networks

    Mansoor Farooq1,*, Mubashir Hassan Khan2

    Journal on Internet of Things, Vol.4, No.3, pp. 155-168, 2022, DOI:10.32604/jiot.2022.039271 - 12 June 2023

    Abstract An “Intrusion Detection System” (IDS) is a security measure designed to perceive and be aware of unauthorized access or malicious activity on a computer system or network. Signature-based IDSs employ an attack signature database to identify intrusions. This indicates that the system can only identify known attacks and cannot identify brand-new or unidentified assaults. In Wireless 6G IoT networks, signature-based IDSs can be useful to detect a wide range of known attacks such as viruses, worms, and Trojans. However, these networks have specific requirements and constraints, such as the need for real-time detection and low-power More >

  • Open Access

    ARTICLE

    An Improved Handoff Algorithm for Heterogeneous Wireless Networks

    Deepak Dahiya1, Payal Mahajan2,*, Zaheeruddin2, Mamta Dahiya3

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3433-3453, 2022, DOI:10.32604/cmc.2022.026676 - 16 June 2022

    Abstract Heterogeneous Wireless Network is currently a major area of focus in communication engineering. But the important issue in recent communication is the approachability to the wireless networks while maintaining the quality of service. Today, all the wireless access networks are working in tandem to keep the users always connected to the internet cloud that matches the price affordability and performance goals. In order to achieve seamless connectivity, due consideration has to be given to handoff precision and a smaller number of handoffs. Several researchers have used heuristic approaches to solve this issue. In the present More >

Displaying 11-20 on page 2 of 62. Per Page