Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (210)
  • Open Access

    ARTICLE

    In-Depth Study of Potential-Based Routing and New Exploration of Its Scheduling Integration

    Jihoon Sung1, Yeunwoong Kyung2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2891-2911, 2024, DOI:10.32604/cmes.2024.051772

    Abstract Industrial wireless mesh networks (WMNs) have been widely deployed in various industrial sectors, providing services such as manufacturing process monitoring, equipment control, and sensor data collection. A notable characteristic of industrial WMNs is their distinct traffic pattern, where the majority of traffic flows originate from mesh nodes and are directed towards mesh gateways. In this context, this paper adopts and revisits a routing algorithm known as ALFA (autonomous load-balancing field-based anycast routing), tailored specifically for anycast (one-to-one-of-many) networking in WMNs, where traffic flows can be served through any one of multiple gateways. In essence, the… More >

  • Open Access

    ARTICLE

    CoopAI-Route: DRL Empowered Multi-Agent Cooperative System for Efficient QoS-Aware Routing for Network Slicing in Multi-Domain SDN

    Meignanamoorthi Dhandapani*, V. Vetriselvi, R. Aishwarya

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2449-2486, 2024, DOI:10.32604/cmes.2024.050986

    Abstract The emergence of beyond 5G networks has the potential for seamless and intelligent connectivity on a global scale. Network slicing is crucial in delivering services for different, demanding vertical applications in this context. Next-generation applications have time-sensitive requirements and depend on the most efficient routing path to ensure packets reach their intended destinations. However, the existing IP (Internet Protocol) over a multi-domain network faces challenges in enforcing network slicing due to minimal collaboration and information sharing among network operators. Conventional inter-domain routing methods, like Border Gateway Protocol (BGP), cannot make routing decisions based on performance,… More >

  • Open Access

    ARTICLE

    QoS Routing Optimization Based on Deep Reinforcement Learning in SDN

    Yu Song1, Xusheng Qian2, Nan Zhang3, Wei Wang2, Ao Xiong1,*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3007-3021, 2024, DOI:10.32604/cmc.2024.051217

    Abstract To enhance the efficiency and expediency of issuing e-licenses within the power sector, we must confront the challenge of managing the surging demand for data traffic. Within this realm, the network imposes stringent Quality of Service (QoS) requirements, revealing the inadequacies of traditional routing allocation mechanisms in accommodating such extensive data flows. In response to the imperative of handling a substantial influx of data requests promptly and alleviating the constraints of existing technologies and network congestion, we present an architecture for QoS routing optimization with in Software Defined Network (SDN), leveraging deep reinforcement learning. This… More >

  • Open Access

    REVIEW

    Towards Blockchain-Based Secure BGP Routing, Challenges and Future Research Directions

    Qiong Yang1, Li Ma1,2,*, Shanshan Tu1, Sami Ullah3, Muhammad Waqas4,5, Hisham Alasmary6

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2035-2062, 2024, DOI:10.32604/cmc.2024.049970

    Abstract Border Gateway Protocol (BGP) is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different destinations. The BGP protocol exhibits security design defects, such as an unconditional trust mechanism and the default acceptance of BGP route announcements from peers by BGP neighboring nodes, easily triggering prefix hijacking, path forgery, route leakage, and other BGP security threats. Meanwhile, the traditional BGP security mechanism, relying on a public key infrastructure, faces issues like a single point of failure and a single point of trust. The decentralization, anti-tampering, and More >

  • Open Access

    ARTICLE

    The Impact of Network Topologies and Radio Duty Cycle Mechanisms on the RPL Routing Protocol Power Consumption

    Amal Hkiri1,*, Hamzah Faraj2, Omar Ben Bahri2, Mouna Karmani1, Sami Alqurashi2, Mohsen Machhout1

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 1835-1854, 2024, DOI:10.32604/cmc.2024.049207

    Abstract The Internet of Things (IoT) has witnessed a significant surge in adoption, particularly through the utilization of Wireless Sensor Networks (WSNs), which comprise small internet-connected devices. These deployments span various environments and offer a multitude of benefits. However, the widespread use of battery-powered devices introduces challenges due to their limited hardware resources and communication capabilities. In response to this, the Internet Engineering Task Force (IETF) has developed the IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) to address the unique requirements of such networks. Recognizing the critical role of RPL in maintaining high performance,… More >

  • Open Access

    ARTICLE

    Reliable Data Collection Model and Transmission Framework in Large-Scale Wireless Medical Sensor Networks

    Haosong Gou1, Gaoyi Zhang1, Renê Ripardo Calixto2, Senthil Kumar Jagatheesaperumal3, Victor Hugo C. de Albuquerque2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 1077-1102, 2024, DOI:10.32604/cmes.2024.047806

    Abstract Large-scale wireless sensor networks (WSNs) play a critical role in monitoring dangerous scenarios and responding to medical emergencies. However, the inherent instability and error-prone nature of wireless links present significant challenges, necessitating efficient data collection and reliable transmission services. This paper addresses the limitations of existing data transmission and recovery protocols by proposing a systematic end-to-end design tailored for medical event-driven cluster-based large-scale WSNs. The primary goal is to enhance the reliability of data collection and transmission services, ensuring a comprehensive and practical approach. Our approach focuses on refining the hop-count-based routing scheme to achieve… More >

  • Open Access

    ARTICLE

    Falcon Optimization Algorithm-Based Energy Efficient Communication Protocol for Cluster-Based Vehicular Networks

    Youseef Alotaibi1, B. Rajasekar2, R. Jayalakshmi3, Surendran Rajendran4,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4243-4262, 2024, DOI:10.32604/cmc.2024.047608

    Abstract Rapid development in Information Technology (IT) has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle (V2V) transmission. Vehicular networks give a safe and more effective driving experience by presenting time-sensitive and location-aware data. The communication occurs directly between V2V and Base Station (BS) units such as the Road Side Unit (RSU), named as a Vehicle to Infrastructure (V2I). However, the frequent topology alterations in VANETs generate several problems with data transmission as the vehicle velocity differs with time. Therefore, the scheme of an effectual routing protocol for reliable and stable communications… More >

  • Open Access

    ARTICLE

    Research on Sleeve Grouting Density Detection Based on the Impact Echo Method

    Pu Zhang1, Yingjun Li1, Xinyu Zhu1, Shizhan Xu1, Pinwu Guan1,*, Wei Liu2, Yanwei Guo2, Haibo Wang2

    Structural Durability & Health Monitoring, Vol.18, No.2, pp. 143-159, 2024, DOI:10.32604/sdhm.2024.046986

    Abstract Grouting defects are an inherent challenge in construction practices, exerting a considerable impact on the operational structural integrity of connections. This investigation employed the impact-echo technique for the detection of grouting anomalies within connections, enhancing its precision through the integration of wavelet packet energy principles for damage identification purposes. A series of grouting completeness assessments were meticulously conducted, taking into account variables such as the divergent material properties of the sleeves and the configuration of adjacent reinforcement. The findings revealed that: (i) the energy distribution for the high-strength concrete cohort predominantly occupied the frequency bands More >

  • Open Access

    ARTICLE

    Dynamic Routing of Multiple QoS-Required Flows in Cloud-Edge Autonomous Multi-Domain Data Center Networks

    Shiyan Zhang1,*, Ruohan Xu2, Zhangbo Xu3, Cenhua Yu1, Yuyang Jiang1, Yuting Zhao4

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2287-2308, 2024, DOI:10.32604/cmc.2023.046550

    Abstract The 6th generation mobile networks (6G) network is a kind of multi-network interconnection and multi-scenario coexistence network, where multiple network domains break the original fixed boundaries to form connections and convergence. In this paper, with the optimization objective of maximizing network utility while ensuring flows performance-centric weighted fairness, this paper designs a reinforcement learning-based cloud-edge autonomous multi-domain data center network architecture that achieves single-domain autonomy and multi-domain collaboration. Due to the conflict between the utility of different flows, the bandwidth fairness allocation problem for various types of flows is formulated by considering different defined reward… More >

  • Open Access

    ARTICLE

    Secure and Reliable Routing in the Internet of Vehicles Network: AODV-RL with BHA Attack Defense

    Nadeem Ahmed1,*, Khalid Mohammadani2, Ali Kashif Bashir3,4,5, Marwan Omar6, Angel Jones7, Fayaz Hassan1

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.1, pp. 633-659, 2024, DOI:10.32604/cmes.2023.031342

    Abstract Wireless technology is transforming the future of transportation through the development of the Internet of Vehicles (IoV). However, intricate security challenges are intertwined with technological progress: Vehicular ad hoc Networks (VANETs), a core component of IoV, face security issues, particularly the Black Hole Attack (BHA). This malicious attack disrupts the seamless flow of data and threatens the network’s overall reliability; also, BHA strategically disrupts communication pathways by dropping data packets from legitimate nodes altogether. Recognizing the importance of this challenge, we have introduced a new solution called ad hoc On-Demand Distance Vector-Reputation-based mechanism Local Outlier… More >

Displaying 1-10 on page 1 of 210. Per Page