Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (57)
  • Open Access

    ARTICLE

    Securing Forwarding Layers from Eavesdropping Attacks Using Proactive Approaches

    Jiajun Yan, Ying Zhou*, Anchen Dai, Tao Wang

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 563-580, 2024, DOI:10.32604/cmc.2024.048922 - 25 April 2024

    Abstract As an emerging network paradigm, the software-defined network (SDN) finds extensive application in areas such as smart grids, the Internet of Things (IoT), and edge computing. The forwarding layer in software-defined networks is susceptible to eavesdropping attacks. Route hopping is a moving target defense (MTD) technology that is frequently employed to resist eavesdropping attacks. In the traditional route hopping technology, both request and reply packets use the same hopping path. If an eavesdropping attacker monitors the nodes along this path, the risk of 100% data leakage becomes substantial. In this paper, we present an effective… More >

  • Open Access

    ARTICLE

    Weighted Forwarding in Graph Convolution Networks for Recommendation Information Systems

    Sang-min Lee, Namgi Kim*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1897-1914, 2024, DOI:10.32604/cmc.2023.046346 - 27 February 2024

    Abstract Recommendation Information Systems (RIS) are pivotal in helping users in swiftly locating desired content from the vast amount of information available on the Internet. Graph Convolution Network (GCN) algorithms have been employed to implement the RIS efficiently. However, the GCN algorithm faces limitations in terms of performance enhancement owing to the due to the embedding value-vanishing problem that occurs during the learning process. To address this issue, we propose a Weighted Forwarding method using the GCN (WF-GCN) algorithm. The proposed method involves multiplying the embedding results with different weights for each hop layer during graph… More >

  • Open Access

    ARTICLE

    Enhancing Data Forwarding Efficiency in SIoT with Multidimensional Social Relations

    Fang Xu1,2,3, Songhao Jiang1,2, Yi Ma1,2,3,*, Manzoor Ahmed1,3,*, Zenggang Xiong1,2,3, Yuanlin Lyu1,2

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1095-1113, 2024, DOI:10.32604/cmc.2023.046577 - 30 January 2024

    Abstract Effective data communication is a crucial aspect of the Social Internet of Things (SIoT) and continues to be a significant research focus. This paper proposes a data forwarding algorithm based on Multidimensional Social Relations (MSRR) in SIoT to solve this problem. The proposed algorithm separates message forwarding into intra- and cross-community forwarding by analyzing interest traits and social connections among nodes. Three new metrics are defined: the intensity of node social relationships, node activity, and community connectivity. Within the community, messages are sent by determining which node is most similar to the sender by weighing More >

  • Open Access

    ARTICLE

    Research on Anti-Fluctuation Control of Winding Tension System Based on Feedforward Compensation

    Yujie Duan1, Jianguo Liang1,*, Jianglin Liu1, Haifeng Gao1, Yinhui Li2, Jinzhu Zhang1, Xinyu Wen3

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1239-1261, 2024, DOI:10.32604/cmes.2023.044400 - 29 January 2024

    Abstract In the fiber winding process, strong disturbance, uncertainty, strong coupling, and fiber friction complicate the winding constant tension control. In order to effectively reduce the influence of these problems on the tension output, this paper proposed a tension fluctuation rejection strategy based on feedforward compensation. In addition to the bias harmonic curve of the unknown state, the tension fluctuation also contains the influence of bounded noise. A tension fluctuation observer (TFO) is designed to cancel the uncertain periodic signal, in which the frequency generator is used to estimate the critical parameter information. Then, the fluctuation More >

  • Open Access

    ARTICLE

    Improved QoS-Secure Routing in MANET Using Real-Time Regional ME Feature Approximation

    Y. M. Mahaboob John1,*, G. Ravi2

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3653-3666, 2023, DOI:10.32604/csse.2023.036916 - 03 April 2023

    Abstract Mobile Ad-hoc Network (MANET) routing problems are thoroughly studied several approaches are identified in support of MANET. Improve the Quality of Service (QoS) performance of MANET is achieving higher performance. To reduce this drawback, this paper proposes a new secure routing algorithm based on real-time partial ME (Mobility, energy) approximation. The routing method RRME (Real-time Regional Mobility Energy) divides the whole network into several parts, and each node’s various characteristics like mobility and energy are randomly selected neighbors accordingly. It is done in the path discovery phase, estimated to identify and remove malicious nodes. In… More >

  • Open Access

    ARTICLE

    Adaptive Learning Video Streaming with QoE in Multi-Home Heterogeneous Networks

    S. Vijayashaarathi1,*, S. NithyaKalyani2

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 2881-2897, 2023, DOI:10.32604/csse.2023.036864 - 03 April 2023

    Abstract In recent years, real-time video streaming has grown in popularity. The growing popularity of the Internet of Things (IoT) and other wireless heterogeneous networks mandates that network resources be carefully apportioned among versatile users in order to achieve the best Quality of Experience (QoE) and performance objectives. Most researchers focused on Forward Error Correction (FEC) techniques when attempting to strike a balance between QoE and performance. However, as network capacity increases, the performance degrades, impacting the live visual experience. Recently, Deep Learning (DL) algorithms have been successfully integrated with FEC to stream videos across multiple… More >

  • Open Access

    ARTICLE

    An Improved Time Feedforward Connections Recurrent Neural Networks

    Jin Wang1,2, Yongsong Zou1, Se-Jung Lim3,*

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2743-2755, 2023, DOI:10.32604/iasc.2023.033869 - 15 March 2023

    Abstract Recurrent Neural Networks (RNNs) have been widely applied to deal with temporal problems, such as flood forecasting and financial data processing. On the one hand, traditional RNNs models amplify the gradient issue due to the strict time serial dependency, making it difficult to realize a long-term memory function. On the other hand, RNNs cells are highly complex, which will significantly increase computational complexity and cause waste of computational resources during model training. In this paper, an improved Time Feedforward Connections Recurrent Neural Networks (TFC-RNNs) model was first proposed to address the gradient issue. A parallel… More >

  • Open Access

    ARTICLE

    Cooperative Channel and Optimized Route Selection in Adhoc Network

    D. Manohari1,*, M. S. Kavitha2, K. Periyakaruppan3, B. Chellapraba4

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1547-1560, 2023, DOI:10.32604/iasc.2023.030540 - 05 January 2023

    Abstract Over the last decade, mobile Adhoc networks have expanded dramatically in popularity, and their impact on the communication sector on a variety of levels is enormous. Its uses have expanded in lockstep with its growth. Due to its instability in usage and the fact that numerous nodes communicate data concurrently, adequate channel and forwarder selection is essential. In this proposed design for a Cognitive Radio Cognitive Network (CRCN), we gain the confidence of each forwarding node by contacting one-hop and second level nodes, obtaining reports from them, and selecting the forwarder appropriately with the use… More >

  • Open Access

    ARTICLE

    Modified Adhoc On-Demand Distance Vector for Trust Evaluation And Attack Detection

    S. Soundararajan1,*, B. R. Tapas Bapu2, C. Kotteeswaran1, S. Venkatasubramanian3, P. J. Sathish Kumar4, Ahmed Mudassar Ali2

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1227-1240, 2023, DOI:10.32604/iasc.2023.025752 - 05 January 2023

    Abstract Recently, Wireless Sensor Network (WSN) becomes most potential technologies for providing improved services to several data gathering and tracking applications. Because of the wireless medium, multi-hop communication, absence of physical protectivity, and accumulated traffic, WSN is highly vulnerable to security concerns. Therefore, this study explores a specific type of DoS attack identified as a selective forwarding attack where the misbehaving node in the network drops packet on a selective basis. It is challenging to determine if packet loss is caused by a collision in the medium access path, poor channel quality, or a selective forwarding More >

  • Open Access

    ARTICLE

    Efficient Routing Protocol with Localization Based Priority & Congestion Control for UWSN

    S. Sandhiyaa*, C. Gomathy

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4747-4768, 2023, DOI:10.32604/cmc.2023.032298 - 28 December 2022

    Abstract The nodes in the sensor network have a wide range of uses, particularly on under-sea links that are skilled for detecting, handling as well as management. The underwater wireless sensor networks support collecting pollution data, mine survey, oceanographic information collection, aided navigation, strategic surveillance, and collection of ocean samples using detectors that are submerged in water. Localization, congestion routing, and prioritizing the traffic is the major issue in an underwater sensor network. Our scheme differentiates the different types of traffic and gives every type of traffic its requirements which is considered regarding network resource. Minimization… More >

Displaying 1-10 on page 1 of 57. Per Page