Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (17)
  • Open Access


    WiFi6 Dynamic Channel Optimization Method for Fault Tolerance in Power Communication Network

    Hong Zhu1, Lisha Gao1, Lei Wei1, Guangchang Yang2,*, Sujie Shao2

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5501-5519, 2023, DOI:10.32604/cmc.2023.035759

    Abstract As the scale of power networks has expanded, the demand for multi-service transmission has gradually increased. The emergence of WiFi6 has improved the transmission efficiency and resource utilization of wireless networks. However, it still cannot cope with situations such as wireless access point (AP) failure. To solve this problem, this paper combines orthogonal frequency division multiple access (OFDMA) technology and dynamic channel optimization technology to design a fault-tolerant WiFi6 dynamic resource optimization method for achieving high quality wireless services in a wirelessly covered network even when an AP fails. First, under the premise of AP layout with strong coverage over… More >

  • Open Access


    Novel Double Modular Redundancy Based Fault-Tolerant FIR Filter for Image Denoising

    V. S. Vaisakhi1,*, D. Surendran2

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 181-193, 2023, DOI:10.32604/csse.2023.032514

    Abstract In signal processing and communication systems, digital filters are widely employed. In some circumstances, the reliability of those systems is crucial, necessitating the use of fault tolerant filter implementations. Many strategies have been presented throughout the years to achieve fault tolerance by utilising the structure and properties of the filters. As technology advances, more complicated systems with several filters become possible. Some of the filters in those complicated systems frequently function in parallel, for example, by applying the same filter to various input signals. Recently, a simple strategy for achieving fault tolerance that takes advantage of the availability of parallel… More >

  • Open Access


    A Broker-Based Task-Scheduling Mechanism Using Replication Approach for Cloud Systems

    Abdulelah Alwabel*

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 2217-2232, 2023, DOI:10.32604/iasc.2023.033703

    Abstract The reliability and availability of cloud systems have become major concerns of service providers, brokers, and end-users. Therefore, studying fault-tolerance mechanisms in cloud computing attracts intense attention in industry and academia. The task-scheduling mechanisms can improve the fault-tolerance level of cloud systems. A task-scheduling mechanism distributes tasks to a group of instances to be executed. Much work has been undertaken in this direction to improve the overall outcome of cloud computing, such as improving service quality and reducing power consumption. However, little work on task scheduling has studied the problem of lost tasks from the broker’s perspective. Task loss can… More >

  • Open Access


    Energy Efficient Unequal Fault Tolerance Clustering Approach

    Sowjanya Ramisetty1,2, Divya Anand2, Kavita3,*, Sahil Verma3, NZ Jhanjhi4, Mehedi Masud5, Mohammed Baz6

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1971-1983, 2023, DOI:10.32604/csse.2022.021924

    Abstract For achieving Energy-Efficiency in wireless sensor networks (WSNs), different schemes have been proposed which focuses only on reducing the energy consumption. A shortest path determines for the Base Station (BS), but fault tolerance and energy balancing gives equal importance for improving the network lifetime. For saving energy in WSNs, clustering is considered as one of the effective methods for Wireless Sensor Networks. Because of the excessive overload, more energy consumed by cluster heads (CHs) in a cluster based WSN to receive and aggregate the information from member sensor nodes and it leads to failure. For increasing the WSNs’ lifetime, the… More >

  • Open Access


    A Single-Ended Protection Principle for LCC-VSC-MTDC System with High Resistance Fault Tolerance

    Dahai Zhang*, Chuanjian Wu, Jinghan He

    Energy Engineering, Vol.120, No.1, pp. 1-21, 2023, DOI:10.32604/ee.2022.023304

    Abstract Line-commutated converter-voltage source converter (LCC-VSC) power transmission technology does not have the problem of communication failure very usually. It therefore can support the long-distance, long-capacity transmission of electric energy. However, factors such as topology, control strategy, and short-circuit capacities make the traditional protection principles not fully applicable to LCC-VSC hybrid transmission systems. To enhance the reliability of hybrid DC systems, a single-ended principle based on transmission coefficients is proposed and produced. First, the equivalent circuit of the LCC-VSC hybrid DC system is analyzed and the expression of the first traveling wave is deduced accordingly. Then, the concept of multi-frequency transmission… More >

  • Open Access


    An Optimal Cluster Head and Gateway Node Selection with Fault Tolerance

    P. Rahul*, B. Kaarthick

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1595-1609, 2023, DOI:10.32604/iasc.2023.025762

    Abstract In Mobile Ad Hoc Networks (MANET), Quality of Service (QoS) is an important factor that must be analysed for the showing the better performance. The Node Quality-based Clustering Algorithm using Fuzzy-Fruit Fly Optimization for Cluster Head and Gateway Selection (NQCAFFFOCHGS) has the best network performance because it uses the Improved Weighted Clustering Algorithm (IWCA) to cluster the network and the FFO algorithm, which uses fuzzy-based network metrics to select the best CH and entryway. However, the major drawback of the fuzzy system was to appropriately select the membership functions. Also, the network metrics related to the path or link connectivity… More >

  • Open Access


    Hybrid Smart Contracts for Securing IoMT Data

    D. Palanikkumar1, Adel Fahad Alrasheedi2, P. Parthasarathi3, S. S. Askar2, Mohamed Abouhawwash4,5,*

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 457-469, 2023, DOI:10.32604/csse.2023.024884

    Abstract Data management becomes essential component of patient healthcare. Internet of Medical Things (IoMT) performs a wireless communication between E-medical applications and human being. Instead of consulting a doctor in the hospital, patients get health related information remotely from the physician. The main issues in the E-Medical application are lack of safety, security and privacy preservation of patient’s health care data. To overcome these issues, this work proposes block chain based IoMT Processed with Hybrid consensus protocol for secured storage. Patients health data is collected from physician, smart devices etc. The main goal is to store this highly valuable health related… More >

  • Open Access


    Fault Tolerance in the Joint EDF-RMS Algorithm: A Comparative Simulation Study

    Rashmi Sharma1, Nitin Nitin2, Deepak Dahiya3,*

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5197-5213, 2022, DOI:10.32604/cmc.2022.025059

    Abstract Failure is a systemic error that affects overall system performance and may eventually crash across the entire configuration. In Real-Time Systems (RTS), deadline is the key to successful completion of the program. If tasks effectively meet the deadline, it means the system is working in pristine order. However, missing the deadline means a systemic fault due to which the system can crash (hard RTS) or degrade inclusive performance (soft RTS). To fine-tune the RTS, tolerance is the critical issue and must be handled with extreme care. This article explains the context of fault tolerance with improvised Joint EDF-RMS algorithm in… More >

  • Open Access


    Fault Tolerance Techniques for Multi-Hop Clustering in Wireless Sensor Networks

    Adel Rajab*

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1743-1761, 2022, DOI:10.32604/iasc.2022.021922

    Abstract Wireless sensor networks (WSN) deploy many nodes over an extended area for traffic surveillance, environmental monitoring, healthcare, tracking wildlife, and military sensing. Nodes of the WSN have a limited amount of energy. Each sensor node collects information from the surrounding area and forwards it onto the cluster head, which then sends it on to the base station (BS). WSNs extend the lifetime of the network through clustering techniques. Choosing nodes with the greatest residual energy as cluster heads is based on the idea that energy consumption is periodically distributed between nodes. The sink node gathers information from its environment that… More >

  • Open Access


    Intelligent Multilevel Node Authentication in Mobile Computing Using Clone Node

    Neha Malhotra1,2,*, Manju Bala3

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5269-5284, 2022, DOI:10.32604/cmc.2022.020920

    Abstract Nodes in a mobile computing system are vulnerable to clone attacks due to their mobility. In such attacks, an adversary accesses a few network nodes, generates replication, then inserts this replication into the network, potentially resulting in numerous internal network attacks. Most existing techniques use a central base station, which introduces several difficulties into the system due to the network's reliance on a single point, while other ways generate more overhead while jeopardising network lifetime. In this research, an intelligent double hashing-based clone node identification scheme was used, which reduces communication and memory costs while performing the clone detection procedure.… More >

Displaying 1-10 on page 1 of 17. Per Page  

Share Link