Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    RAISE: A Resilient Anonymous Information Sharing Environment

    Ning Hu1, Ling Liu1, Xin Liu3, Kaijun Wu2, Yue Zhao2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.3, pp. 2743-2759, 2023, DOI:10.32604/cmes.2023.026939 - 03 August 2023

    Abstract With the widespread application of cloud computing and network virtualization technologies, more and more enterprise applications are directly deployed in the cloud. However, the traditional TCP/IP network transmission model does not fully consider the information security issues caused by the uncontrollable internet environment. Network security communication solutions represented by encrypted virtual private networks (VPN) are facing multiple security threats. In fact, during the communication process, the user application needs to protect not only the content of the communication but also the behavior of the communication, such as the communication relationship, the communication protocol, and so… More >

  • Open Access

    ARTICLE

    Multivariate Aggregated NOMA for Resource Aware Wireless Network Communication Security

    V. Sridhar1, K.V. Ranga Rao2, Saddam Hussain3,*, Syed Sajid Ullah4, Roobaea Alroobaea5, Maha Abdelhaq6, Raed Alsaqour7

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1693-1708, 2023, DOI:10.32604/cmc.2023.028129 - 22 September 2022

    Abstract Nonorthogonal Multiple Access (NOMA) is incorporated into the wireless network systems to achieve better connectivity, spectral and energy effectiveness, higher data transfer rate, and also obtain the high quality of services (QoS). In order to improve throughput and minimum latency, a Multivariate Renkonen Regressive Weighted Preference Bootstrap Aggregation based Nonorthogonal Multiple Access (MRRWPBA-NOMA) technique is introduced for network communication. In the downlink transmission, each mobile device's resources and their characteristics like energy, bandwidth, and trust are measured. Followed by, the Weighted Preference Bootstrap Aggregation is applied to recognize the resource-efficient mobile devices for aware data More >

Displaying 1-10 on page 1 of 2. Per Page