Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    ARTICLE

    Enhanced Energy Efficient with a Trust Aware in MANET for Real-Time Applications

    M. V. Narayana1, Vadla Pradeep Kumar2, Ashok Kumar Nanda2,*, Hanumantha Rao Jalla3, Subba Reddy Chavva4

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 587-607, 2023, DOI:10.32604/cmc.2023.034773 - 06 February 2023

    Abstract Mobile ad hoc networks (MANETs) are subjected to attack detection for transmitting and creating new messages or existing message modifications. The attacker on another node evaluates the forging activity in the message directly or indirectly. Every node sends short packets in a MANET environment with its identifier, location on the map, and time through beacons. The attackers on the network broadcast the warning message using faked coordinates, providing the appearance of a network collision. Similarly, MANET degrades the channel utilization performance. Performance highly affects network performance through security algorithms. This paper developed a trust management… More >

  • Open Access

    ARTICLE

    Lens-Oppositional Wild Geese Optimization Based Clustering Scheme for Wireless Sensor Networks Assists Real Time Disaster Management

    R. Surendran1,*, Youseef Alotaibi2, Ahmad F. Subahi3

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 835-851, 2023, DOI:10.32604/csse.2023.036757 - 20 January 2023

    Abstract Recently, wireless sensor networks (WSNs) find their applicability in several real-time applications such as disaster management, military, surveillance, healthcare, etc. The utilization of WSNs in the disaster monitoring process has gained significant attention among research communities and governments. Real-time monitoring of disaster areas using WSN is a challenging process due to the energy-limited sensor nodes. Therefore, the clustering process can be utilized to improve the energy utilization of the nodes and thereby improve the overall functioning of the network. In this aspect, this study proposes a novel Lens-Oppositional Wild Goose Optimization based Energy Aware Clustering… More >

  • Open Access

    ARTICLE

    Lightweight Network Ensemble Architecture for Environmental Perception on the Autonomous System

    Yingpeng Dai1, Junzheng Wang1, Jing Li1,*, Lingfeng Meng2, Songfeng Wang2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.1, pp. 135-156, 2023, DOI:10.32604/cmes.2022.021525 - 24 August 2022

    Abstract It is important for the autonomous system to understand environmental information. For the autonomous system, it is desirable to have a strong generalization ability to deal with different complex environmental information, as well as have high accuracy and quick inference speed. Network ensemble architecture is a good choice to improve network performance. However, it is unsuitable for real-time applications on the autonomous system. To tackle this problem, a new neural network ensemble named partial-shared ensemble network (PSENet) is presented. PSENet changes network ensemble architecture from parallel architecture to scatter architecture and merges multiple component networks More >

  • Open Access

    ARTICLE

    Service-Aware Access Control Procedure for Blockchain Assisted Real-Time Applications

    Alaa Omran Almagrabi1,*, A. K. Bashir2

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3649-3667, 2021, DOI:10.32604/cmc.2021.015056 - 01 March 2021

    Abstract The design of distributed ledger, Asymmetric Key Algorithm (AKA) blockchain systems, is prominent in administering security and access control in various real-time services and applications. The assimilation of blockchain systems leverages the reliable access and secure service provisioning of the services. However, the distributed ledger technology’s access control and chained decisions are defaced by pervasive and service unawareness. It results in degrading security through unattended access control for limited-service users. In this article, a service-aware access control procedure (SACP) is introduced to address the afore-mentioned issue. The proposed SACP defines attended access control for all More >

Displaying 1-10 on page 1 of 4. Per Page