Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (37)
  • Open Access

    ARTICLE

    Dynamic Deep Learning for Enhanced Reliability in Wireless Sensor Networks: The DTLR-Net Approach

    Gajjala Savithri1,2, N. Raghavendra Sai1,*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2547-2569, 2024, DOI:10.32604/cmc.2024.055827 - 18 November 2024

    Abstract In the world of wireless sensor networks (WSNs), optimizing performance and extending network lifetime are critical goals. In this paper, we propose a new model called DTLR-Net (Deep Temporal LSTM Regression Network) that employs long-short-term memory and is effective for long-term dependencies. Mobile sinks can move in arbitrary patterns, so the model employs long short-term memory (LSTM) networks to handle such movements. The parameters were initialized iteratively, and each node updated its position, mobility level, and other important metrics at each turn, with key measurements including active or inactive node ratio, energy consumption per cycle,… More >

  • Open Access

    ARTICLE

    Elevating Localization Accuracy in Wireless Sensor Networks: A Refined DV-Hop Approach

    Muhammad Aamer Ejaz1,*, Kamalrulnizam Abu Bakar1, Ismail Fauzi Bin Isnin1, Babangida Isyaku1,2,*, Taiseer Abdalla Elfadil Eisa3, Abdelzahir Abdelmaboud4, Asma Abbas Hassan Elnour3

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1511-1528, 2024, DOI:10.32604/cmc.2024.054938 - 15 October 2024

    Abstract Localization is crucial in wireless sensor networks for various applications, such as tracking objects in outdoor environments where GPS (Global Positioning System) or prior installed infrastructure is unavailable. However, traditional techniques involve many anchor nodes, increasing costs and reducing accuracy. Existing solutions do not address the selection of appropriate anchor nodes and selecting localized nodes as assistant anchor nodes for the localization process, which is a critical element in the localization process. Furthermore, an inaccurate average hop distance significantly affects localization accuracy. We propose an improved DV-Hop algorithm based on anchor sets (AS-IDV-Hop) to improve… More >

  • Open Access

    ARTICLE

    Analysis of Extended Fisher-Kolmogorov Equation in 2D Utilizing the Generalized Finite Difference Method with Supplementary Nodes

    Bingrui Ju1,2, Wenxiang Sun2, Wenzhen Qu1,2,*, Yan Gu2

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 267-280, 2024, DOI:10.32604/cmes.2024.052159 - 20 August 2024

    Abstract In this study, we propose an efficient numerical framework to attain the solution of the extended Fisher-Kolmogorov (EFK) problem. The temporal derivative in the EFK equation is approximated by utilizing the Crank-Nicolson scheme. Following temporal discretization, the generalized finite difference method (GFDM) with supplementary nodes is utilized to address the nonlinear boundary value problems at each time node. These supplementary nodes are distributed along the boundary to match the number of boundary nodes. By incorporating supplementary nodes, the resulting nonlinear algebraic equations can effectively satisfy the governing equation and boundary conditions of the EFK equation. More >

  • Open Access

    ARTICLE

    A Reputation-Based AODV Protocol for Blackhole and Malfunction Nodes Detection and Avoidance

    Qussai M. Yaseen1,2,*, Monther Aldwairi2,3, Ahmad Manasrah4,5

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 1867-1888, 2024, DOI:10.32604/cmc.2024.051179 - 15 August 2024

    Abstract Enhancing the security of Wireless Sensor Networks (WSNs) improves the usability of their applications. Therefore, finding solutions to various attacks, such as the blackhole attack, is crucial for the success of WSN applications. This paper proposes an enhanced version of the AODV (Ad Hoc On-Demand Distance Vector) protocol capable of detecting blackholes and malfunctioning benign nodes in WSNs, thereby avoiding them when delivering packets. The proposed version employs a network-based reputation system to select the best and most secure path to a destination. To achieve this goal, the proposed version utilizes the Watchdogs/Pathrater mechanisms in… More >

  • Open Access

    ARTICLE

    The Effect of Key Nodes on the Malware Dynamics in the Industrial Control Network

    Qiang Fu1, Jun Wang1,*, Changfu Si1, Jiawei Liu2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 329-349, 2024, DOI:10.32604/cmc.2024.048117 - 25 April 2024

    Abstract As industrialization and informatization become more deeply intertwined, industrial control networks have entered an era of intelligence. The connection between industrial control networks and the external internet is becoming increasingly close, which leads to frequent security accidents. This paper proposes a model for the industrial control network. It includes a malware containment strategy that integrates intrusion detection, quarantine, and monitoring. Based on this model, the role of key nodes in the spread of malware is studied, a comparison experiment is conducted to validate the impact of the containment strategy. In addition, the dynamic behavior of… More >

  • Open Access

    ARTICLE

    COVID-19 vaccine related hypermetabolic lymph nodes on PET/CT: Implications of inflammatory findings in cancer imaging

    FERDINANDO CALABRIA1, ANTONIO BAGNATO1, GIULIANA GUADAGNINO2, MARIA TOTEDA1, ANTONIO LANZILLOTTA1, STEFANIA CARDEI1, ROSANNA TAVOLARO1, MARIO LEPORACE1,*

    Oncology Research, Vol.31, No.2, pp. 117-124, 2023, DOI:10.32604/or.2023.027705 - 10 April 2023

    Abstract We observed several patients presenting 2-[18F]FDG uptake in the reactive axillary lymph node at PET/CT imaging, ipsilateral to the site of the COVID-19 vaccine injection. Analog finding was documented at [18F]Choline PET/CT. The aim of our study was to describe this source of false positive cases. All patients examined by PET/CT were included in the study. Data concerning patient anamnesis, laterality, and time interval from recent COVID-19 vaccination were recorded. SUVmax was measured in all lymph nodes expressing tracer uptake after vaccination. Among 712 PET/CT scans with 2-[18F]FDG, 104 were submitted to vaccination; 89/104 patients (85%) presented… More >

  • Open Access

    ARTICLE

    Received Power Based Unmanned Aerial Vehicles (UAVs) Jamming Detection and Nodes Classification Using Machine Learning

    Waleed Aldosari*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1253-1269, 2023, DOI:10.32604/cmc.2023.036111 - 06 February 2023

    Abstract This paper presents a machine-learning method for detecting jamming UAVs and classifying nodes during jamming attacks on Wireless Sensor Networks (WSNs). Jamming is a type of Denial of Service (DoS) attack and intentional interference where a malicious node transmits a high-power signal to increase noise on the receiver side to disrupt the communication channel and reduce performance significantly. To defend and prevent such attacks, the first step is to detect them. The current detection approaches use centralized techniques to detect jamming, where each node collects information and forwards it to the base station. As a… More >

  • Open Access

    ARTICLE

    Enhanced Energy Efficient with a Trust Aware in MANET for Real-Time Applications

    M. V. Narayana1, Vadla Pradeep Kumar2, Ashok Kumar Nanda2,*, Hanumantha Rao Jalla3, Subba Reddy Chavva4

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 587-607, 2023, DOI:10.32604/cmc.2023.034773 - 06 February 2023

    Abstract Mobile ad hoc networks (MANETs) are subjected to attack detection for transmitting and creating new messages or existing message modifications. The attacker on another node evaluates the forging activity in the message directly or indirectly. Every node sends short packets in a MANET environment with its identifier, location on the map, and time through beacons. The attackers on the network broadcast the warning message using faked coordinates, providing the appearance of a network collision. Similarly, MANET degrades the channel utilization performance. Performance highly affects network performance through security algorithms. This paper developed a trust management… More >

  • Open Access

    ARTICLE

    A Coprocessor Architecture for 80/112-bit Security Related Applications

    Muhammad Rashid*, Majid Alotaibi

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6849-6865, 2023, DOI:10.32604/cmc.2023.032849 - 28 December 2022

    Abstract We have proposed a flexible coprocessor key-authentication architecture for 80/112-bit security-related applications over field by employing Elliptic-curve Diffie Hellman (ECDH) protocol. Towards flexibility, a serial input/output interface is used to load/produce secret, public, and shared keys sequentially. Moreover, to reduce the hardware resources and to achieve a reasonable time for cryptographic computations, we have proposed a finite field digit-serial multiplier architecture using combined shift and accumulate techniques. Furthermore, two finite-state-machine controllers are used to perform efficient control functionalities. The proposed coprocessor architecture over and is programmed using Verilog and then implemented on Xilinx Virtex-7 FPGA More >

  • Open Access

    ARTICLE

    DERNNet: Dual Encoding Recurrent Neural Network Based Secure Optimal Routing in WSN

    A. Venkatesh1, S. Asha2,*

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1375-1392, 2023, DOI:10.32604/csse.2023.030944 - 03 November 2022

    Abstract A Wireless Sensor Network (WSN) is constructed with numerous sensors over geographical regions. The basic challenge experienced while designing WSN is in increasing the network lifetime and use of low energy. As sensor nodes are resource constrained in nature, novel techniques are essential to improve lifetime of nodes in WSN. Nodes energy is considered as an important resource for sensor node which are battery powered based. In WSN, energy is consumed mainly while data is being transferred among nodes in the network. Several research works are carried out focusing on preserving energy of nodes in… More >

Displaying 1-10 on page 1 of 37. Per Page