Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (6)
  • Open Access

    ARTICLE

    An Intelligent Security Service Optimization Method Based on Knowledge Base

    Xianju Gao*, Huachun Zhou, Weilin Wang, Jingfu Yan

    Computer Systems Science and Engineering, Vol.49, pp. 19-48, 2025, DOI:10.32604/csse.2024.058327 - 03 January 2025

    Abstract The network security knowledge base standardizes and integrates network security data, providing a reliable foundation for real-time network security protection solutions. However, current research on network security knowledge bases mainly focuses on their construction, while the potential to optimize intelligent security services for real-time network security protection requires further exploration. Therefore, how to effectively utilize the vast amount of historical knowledge in the field of network security and establish a feedback mechanism to update it in real time, thereby enhancing the detection capability of security services against malicious traffic, has become an important issue. Our… More >

  • Open Access

    ARTICLE

    A Novel Approach to Energy Optimization: Efficient Path Selection in Wireless Sensor Networks with Hybrid ANN

    Muhammad Salman Qamar1,*, Ihsan ul Haq1, Amil Daraz2, Atif M. Alamri3, Salman A. AlQahtani4, Muhammad Fahad Munir1

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2945-2970, 2024, DOI:10.32604/cmc.2024.050168 - 15 May 2024

    Abstract In pursuit of enhancing the Wireless Sensor Networks (WSNs) energy efficiency and operational lifespan, this paper delves into the domain of energy-efficient routing protocols. In WSNs, the limited energy resources of Sensor Nodes (SNs) are a big challenge for ensuring their efficient and reliable operation. WSN data gathering involves the utilization of a mobile sink (MS) to mitigate the energy consumption problem through periodic network traversal. The mobile sink (MS) strategy minimizes energy consumption and latency by visiting the fewest nodes or pre-determined locations called rendezvous points (RPs) instead of all cluster heads (CHs). CHs… More >

  • Open Access

    ARTICLE

    Dynamic Security SFC Branching Path Selection Using Deep Reinforcement Learning

    Shuangxing Deng, Man Li*, Huachun Zhou

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2919-2939, 2023, DOI:10.32604/iasc.2023.039985 - 11 September 2023

    Abstract Security service function chaining (SFC) based on software-defined networking (SDN) and network function virtualization (NFV) technology allows traffic to be forwarded sequentially among different security service functions to achieve a combination of security functions. Security SFC can be deployed according to requirements, but the current SFC is not flexible enough and lacks an effective feedback mechanism. The SFC is not traffic aware and the changes of traffic may cause the previously deployed security SFC to be invalid. How to establish a closed-loop mechanism to enhance the adaptive capability of the security SFC to malicious traffic… More >

  • Open Access

    ARTICLE

    DAMFO-Based Optimal Path Selection and Data Aggregation in WSN

    S. Sudha Mercy1,*, J. M. Mathana2, J. S. Leena Jasmine3

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 589-604, 2022, DOI:10.32604/iasc.2022.021068 - 26 October 2021

    Abstract Wireless Sensor Network (WSN) encompasses several tiny devices termed as Sensor Nodes (SN) that have restriction in resources with lower energy, memory, together with computation. Data Aggregation (DA) is required to optimize WSN for secured data transmission at Cluster Head (CH) together with Base Station (BS). With regard to the Energy Efficiency (EE) along with the privacy conservation requirements of WSN in big-data processing and aggregation, this paper proposed Diversity centered Adaptive Moth-Flame Optimization (DAMFO) for Optimal Path Selection (OPS) and DA in WSN. In the proposed work, initially, the Trust Evaluation (TE) process is… More >

  • Open Access

    ARTICLE

    Transmitter-Receiver Path Selection for Cell Range Extension Using Multi-Hop D2D

    Farah Akif1, Kiran Sultan2,*, Aqdas N. Malik1, Ijaz M. Qureshi3, Saba Mahmood4

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2075-2093, 2021, DOI:10.32604/cmc.2021.016721 - 13 April 2021

    Abstract Conventional approach of dealing with more users per coverage area in cellular networks implies densifying the amount of (Access Point) AP which will eventually result in a larger carbon footprint. In this paper, we propose a base station off-loading and cell range extension (CRE) scheme based on multi-hop device-to-device (MHD2D) path selection between transmitter and receiver node. The paper also provides derivations of upper and lower bounds for energy efficiency, capacity, and transmit power. The proposed path selection scheme is inspired by the foraging behavior of honey bees. We present the algorithm as a modified… More >

  • Open Access

    ABSTRACT

    Path Selection of a Spherical Capsule in a Branched Channel

    Zhen Wang1, Yi Sui1, Wen Wang1, Dominique Barthѐs-Biesel2, Anne-Virginie Salsac2,*

    Molecular & Cellular Biomechanics, Vol.16, Suppl.2, pp. 42-43, 2019, DOI:10.32604/mcb.2019.07148

    Abstract Capsules are liquid droplets enclosed by a thin membrane which can resist shear deformation. They are widely found in nature (e.g. red blood cells) and in numerous applications (e.g. food, cosmetic, biomedical and pharmaceutical industries [1]), where they often flow through a complicated network of tubes or channels: this is the case for RBCs in the human circulation or for artificial capsules flowing through microfluidic devices. Central to these flows is the dynamic motion of capsules at bifurcations, in particular the question of path selection. A good understanding of this problem is indeed needed to… More >

Displaying 1-10 on page 1 of 6. Per Page