Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (32)
  • Open Access

    ARTICLE

    Authentication of WSN for Secured Medical Data Transmission Using Diffie Hellman Algorithm

    A. Jenice Prabhu1,*, D. Hevin Rajesh2

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2363-2376, 2023, DOI:10.32604/csse.2023.028089

    Abstract The applications of wireless sensor network (WSN) exhibits a significant rise in recent days since it is enveloped with various advantageous benefits. In the medical field, the emergence of WSN has created marvelous changes in monitoring the health conditions of the patients and so it is attracted by doctors and physicians. WSN assists in providing health care services without any delay and so it plays predominant role in saving the life of human. The data of different persons, time, places and networks have been linked with certain devices, which are collectively known as Internet of Things (IOT); it is regarded… More >

  • Open Access

    ARTICLE

    Secured Health Data Transmission Using Lagrange Interpolation and Artificial Neural Network

    S. Vidhya1,*, V. Kalaivani2

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2673-2692, 2023, DOI:10.32604/csse.2023.027724

    Abstract In recent decades, the cloud computing contributes a prominent role in health care sector as the patient health records are transferred and collected using cloud computing services. The doctors have switched to cloud computing as it provides multiple advantageous measures including wide storage space and easy availability without any limitations. This necessitates the medical field to be redesigned by cloud technology to preserve information about patient’s critical diseases, electrocardiogram (ECG) reports, and payment details. The proposed work utilizes a hybrid cloud pattern to share Massachusetts Institute of Technology-Beth Israel Hospital (MIT-BIH) resources over the private and public cloud. The stored… More >

  • Open Access

    ARTICLE

    LoRa Backscatter Network Efficient Data Transmission Using RF Source Range Control

    Dae-Young Kim1, SoYeon Lee2, Seokhoon Kim1,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4015-4025, 2023, DOI:10.32604/cmc.2023.027078

    Abstract Networks based on backscatter communication provide wireless data transmission in the absence of a power source. A backscatter device receives a radio frequency (RF) source and creates a backscattered signal that delivers data; this enables new services in battery-less domains with massive Internet-of-Things (IoT) devices. Connectivity is highly energy-efficient in the context of massive IoT applications. Outdoors, long-range (LoRa) backscattering facilitates large IoT services. A backscatter network guarantees timeslot-and contention-based transmission. Timeslot-based transmission ensures data transmission, but is not scalable to different numbers of transmission devices. If contention-based transmission is used, collisions are unavoidable. To reduce collisions and increase transmission… More >

  • Open Access

    ARTICLE

    Mobility Aware Zone-Based Routing in Vehicle Ad hoc Networks Using Hybrid Metaheuristic Algorithm

    C. Nandagopal1,*, P. Siva Kumar2, R. Rajalakshmi3, S. Anandamurugan4

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 113-126, 2023, DOI:10.32604/iasc.2023.031103

    Abstract Vehicle Ad hoc Networks (VANETs) have high mobility and a randomized connection structure, resulting in extremely dynamic behavior. Several challenges, such as frequent connection failures, sustainability, multi-hop data transfer, and data loss, affect the effectiveness of Transmission Control Protocols (TCP) on such wireless ad hoc networks. To avoid the problem, in this paper, mobility-aware zone-based routing in VANET is proposed. To achieve this concept, in this paper hybrid optimization algorithm is presented. The hybrid algorithm is a combination of Ant colony optimization (ACO) and artificial bee colony optimization (ABC). The proposed hybrid algorithm is designed for the routing process which… More >

  • Open Access

    ARTICLE

    Generative Adversarial Networks for Secure Data Transmission in Wireless Network

    E. Jayabalan*, R. Pugazendi

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3757-3784, 2023, DOI:10.32604/iasc.2023.031200

    Abstract In this paper, a communication model in cognitive radios is developed and uses machine learning to learn the dynamics of jamming attacks in cognitive radios. It is designed further to make their transmission decision that automatically adapts to the transmission dynamics to mitigate the launched jamming attacks. The generative adversarial learning neural network (GALNN) or generative dynamic neural network (GDNN) automatically learns with the synthesized training data (training) with a generator and discriminator type neural networks that encompass minimax game theory. The elimination of the jamming attack is carried out with the assistance of the defense strategies and with an… More >

  • Open Access

    ARTICLE

    Energy Efficient Networks Using Ant Colony Optimization with Game Theory Clustering

    Harish Gunigari1,*, S. Chitra2

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3557-3571, 2023, DOI:10.32604/iasc.2023.029155

    Abstract Real-time applications based on Wireless Sensor Network (WSN) technologies quickly lead to the growth of an intelligent environment. Sensor nodes play an essential role in distributing information from networking and its transfer to the sinks. The ability of dynamical technologies and related techniques to be aided by data collection and analysis across the Internet of Things (IoT) network is widely recognized. Sensor nodes are low-power devices with low power devices, storage, and quantitative processing capabilities. The existing system uses the Artificial Immune System-Particle Swarm Optimization method to minimize the energy and improve the network’s lifespan. In the proposed system, a… More >

  • Open Access

    ARTICLE

    Smart-Grid Monitoring using IoT with Modified Lagranges Key Based Data Transmission

    C. K. Morarji1,*, N. Sathish Kumar2

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 2875-2892, 2023, DOI:10.32604/iasc.2023.025776

    Abstract One of the recent advancements in the electrical power systems is the smart-grid technology. For the effective functioning of the smart grid, the process like monitoring and controlling have to be given importance. In this paper, the Wireless Sensor Network (WSN) is utilized for tracking the power in smart grid applications. The smart grid is used to produce the electricity and it is connected with the sensor to transmit or receive the data. The data is transmitted quickly by using the Probabilistic Neural Network (PNN), which aids in identifying the shortest path of the nodes. While transmitting the data from… More >

  • Open Access

    ARTICLE

    Chaotic Pigeon Inspired Optimization Technique for Clustered Wireless Sensor Networks

    Anwer Mustafa Hilal1,2,*, Aisha Hassan Abdalla Hashim1, Sami Dhahbi3, Dalia H. Elkamchouchi4, Jaber S. Alzahrani5, Mrim M. Alnfiai6, Amira Sayed A. Aziz7, Abdelwahed Motwakel2

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6547-6561, 2022, DOI:10.32604/cmc.2022.031660

    Abstract Wireless Sensor Networks (WSN) interlink numerous Sensor Nodes (SN) to support Internet of Things (loT) services. But the data gathered from SNs can be divulged, tempered, and forged. Conventional WSN data processes manage the data in a centralized format at terminal gadgets. These devices are prone to attacks and the security of systems can get compromised. Blockchain is a distributed and decentralized technique that has the ability to handle security issues in WSN. The security issues include transactions that may be copied and spread across numerous nodes in a peer-peer network system. This breaches the mutual trust and allows data… More >

  • Open Access

    ARTICLE

    An Effective Signcryption with Optimization Algorithm for IoT-enabled Secure Data Transmission

    A. Chinnappa*, C. Vijayakumaran

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 4017-4031, 2022, DOI:10.32604/cmc.2022.027858

    Abstract Internet of Things (IoT) allows several low resources and controlled devices to interconnect, calculate processes and make decisions in the communication network. In the heterogeneous environment for IoT devices, several challenging issues such as energy, storage, efficiency, and security. The design of encryption techniques enables the transmission of the data in the IoT environment in a secured way. The proper selection of optimal keys helps to boost the encryption performance. With this motivation, the study presents a signcryption with quantum chaotic krill herd algorithm for secured data transmission (SCQCKH-SDT) in IoT environment. The proposed SCQCKH-SDT technique aims to effectively encrypts… More >

  • Open Access

    ARTICLE

    Data Aggregation-based Transmission Method in Ultra-Dense Wireless Networks

    Dae-Young Kim, Seokhoon Kim*

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 727-737, 2023, DOI:10.32604/iasc.2023.027563

    Abstract As the Internet of Things (IoT) advances, machine-type devices are densely deployed and massive networks such as ultra-dense networks (UDNs) are formed. Various devices attend to the network to transmit data using machine-type communication (MTC), whereby numerous, various are generated. MTC devices generally have resource constraints and use wireless communication. In this kind of network, data aggregation is a key function to provide transmission efficiency. It can reduce the number of transmitted data in the network, and this leads to energy saving and reducing transmission delays. In order to effectively operate data aggregation in UDNs, it is important to select… More >

Displaying 11-20 on page 2 of 32. Per Page