Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    ARTICLE

    Task Offloading and Trajectory Optimization in UAV Networks: A Deep Reinforcement Learning Method Based on SAC and A-Star

    Jianhua Liu*, Peng Xie, Jiajia Liu, Xiaoguang Tu

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1243-1273, 2024, DOI:10.32604/cmes.2024.054002 - 27 September 2024

    Abstract In mobile edge computing, unmanned aerial vehicles (UAVs) equipped with computing servers have emerged as a promising solution due to their exceptional attributes of high mobility, flexibility, rapid deployment, and terrain agnosticism. These attributes enable UAVs to reach designated areas, thereby addressing temporary computing swiftly in scenarios where ground-based servers are overloaded or unavailable. However, the inherent broadcast nature of line-of-sight transmission methods employed by UAVs renders them vulnerable to eavesdropping attacks. Meanwhile, there are often obstacles that affect flight safety in real UAV operation areas, and collisions between UAVs may also occur. To solve… More >

  • Open Access

    ARTICLE

    RAISE: A Resilient Anonymous Information Sharing Environment

    Ning Hu1, Ling Liu1, Xin Liu3, Kaijun Wu2, Yue Zhao2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.3, pp. 2743-2759, 2023, DOI:10.32604/cmes.2023.026939 - 03 August 2023

    Abstract With the widespread application of cloud computing and network virtualization technologies, more and more enterprise applications are directly deployed in the cloud. However, the traditional TCP/IP network transmission model does not fully consider the information security issues caused by the uncontrollable internet environment. Network security communication solutions represented by encrypted virtual private networks (VPN) are facing multiple security threats. In fact, during the communication process, the user application needs to protect not only the content of the communication but also the behavior of the communication, such as the communication relationship, the communication protocol, and so… More >

  • Open Access

    ARTICLE

    Multivariate Aggregated NOMA for Resource Aware Wireless Network Communication Security

    V. Sridhar1, K.V. Ranga Rao2, Saddam Hussain3,*, Syed Sajid Ullah4, Roobaea Alroobaea5, Maha Abdelhaq6, Raed Alsaqour7

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1693-1708, 2023, DOI:10.32604/cmc.2023.028129 - 22 September 2022

    Abstract Nonorthogonal Multiple Access (NOMA) is incorporated into the wireless network systems to achieve better connectivity, spectral and energy effectiveness, higher data transfer rate, and also obtain the high quality of services (QoS). In order to improve throughput and minimum latency, a Multivariate Renkonen Regressive Weighted Preference Bootstrap Aggregation based Nonorthogonal Multiple Access (MRRWPBA-NOMA) technique is introduced for network communication. In the downlink transmission, each mobile device's resources and their characteristics like energy, bandwidth, and trust are measured. Followed by, the Weighted Preference Bootstrap Aggregation is applied to recognize the resource-efficient mobile devices for aware data More >

Displaying 1-10 on page 1 of 3. Per Page