期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Adaptive Expanding Ring Search Based Per Hop Behavior Rendition of Routing in MANETs
1
作者 Durr-e-Nayab Mohammad Haseeb Zafar mohammed basheri 《Computers, Materials & Continua》 SCIE EI 2021年第4期1137-1152,共16页
Routing protocols in Mobile Ad Hoc Networks(MANETs)operate with Expanding Ring Search(ERS)mechanism to avoid ooding in the network while tracing step.ERS mechanism searches the network with discerning Time to Live(TTL... Routing protocols in Mobile Ad Hoc Networks(MANETs)operate with Expanding Ring Search(ERS)mechanism to avoid ooding in the network while tracing step.ERS mechanism searches the network with discerning Time to Live(TTL)values described by respective routing protocol that save both energy and time.This work exploits the relation between the TTL value of a packet,trafc on a node and ERS mechanism for routing in MANETs and achieves an Adaptive ERS based Per Hop Behavior(AERSPHB)rendition of requests handling.Each search request is classied based on ERS attributes and then processed for routing while monitoring the node trafc.Two algorithms are designed and examined for performance under exhaustive parametric setup and employed on adaptive premises to enhance the performance of the network.The network is tested under congestion scenario that is based on buffer utilization at node level and link utilization via back-off stage of Carrier Sense Multiple Access with Collision Avoidance(CSMA/CA).Both the link and node level congestion is handled through retransmission and rerouting the packets based on ERS parameters.The aim is to drop the packets that are exhausting the network energy whereas forward the packets nearer to the destination with priority.Extensive simulations are carried out for network scalability,node speed and network terrain size.Our results show that the proposed models attain evident performance enhancement. 展开更多
关键词 Expanding ring search mobile ad hoc networks multi hop wireless networks on-demand ad hoc networks per hop behavior quality of servi
在线阅读 下载PDF
Power Allocation in NOMA-CR for 5G Enabled IoT Networks
2
作者 mohammed basheri Mohammad Haseeb Zafar Imran Khan 《Computers, Materials & Continua》 SCIE EI 2022年第9期5515-5530,共16页
In the power domain,non-orthogonal multiple access(NOMA)supports multiple users on the same time-frequency resources,assigns different transmission powers to different users,and differentiates users by user channel ga... In the power domain,non-orthogonal multiple access(NOMA)supports multiple users on the same time-frequency resources,assigns different transmission powers to different users,and differentiates users by user channel gains.Multi-user signals are superimposed and transmitted in the power domain at the transmitting end by actively implementing controllable interference information,and multi-user detection algorithms,such as successive interference cancellation(SIC)is performed at the receiving end to demodulate the necessary user signals.In contrast to the orthogonal transmission method,the non-orthogonal method can achieve higher spectrum utilization.However,it will increase the receiver complexity.With the development of microelectronics technology,chip processing capabilities continue to increase,laying the foundation for the practical application of non-orthogonal transmission technology.In NOMA,different users are differentiated by different power levels.Therefore,the power allocation has a considerable impact on the NOMA system performance.To address this issue,the idea of splitting power into two portions,intra-subbands and intersubbands,is proposed in this study as a useful algorithm.Then,such optimization problems are solved using proportional fair scheduling and water-filling algorithms.Finally,the error propagation was modeled and analyzed for the residual interference.The proposed technique effectively increased the system throughput and performance under various operating settings according to simulation findings.A comparison is performed with existing algorithms for performance evaluation. 展开更多
关键词 NOMA wireless networks power domain 5G networks
在线阅读 下载PDF
Quantum Cat Swarm Optimization Based Clustering with Intrusion Detection Technique for Future Internet of Things Environment
3
作者 mohammed basheri Mahmoud Ragab 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3783-3798,共16页
The Internet of Things(IoT)is one of the emergent technologies with advanced developments in several applications like creating smart environments,enabling Industry 4.0,etc.As IoT devices operate via an inbuilt and li... The Internet of Things(IoT)is one of the emergent technologies with advanced developments in several applications like creating smart environments,enabling Industry 4.0,etc.As IoT devices operate via an inbuilt and limited power supply,the effective utilization of available energy plays a vital role in designing the IoT environment.At the same time,the communication of IoT devices in wireless mediums poses security as a challenging issue.Recently,intrusion detection systems(IDS)have paved the way to detect the presence of intrusions in the IoT environment.With this motivation,this article introduces a novel QuantumCat SwarmOptimization based Clustering with Intrusion Detection Technique(QCSOBC-IDT)for IoT environment.The QCSOBC-IDT model aims to achieve energy efficiency by clustering the nodes and security by intrusion detection.Primarily,the QCSOBC-IDT model presents a new QCSO algorithm for effectively choosing cluster heads(CHs)and organizing a set of clusters in the IoT environment.Besides,the QCSO algorithm computes a fitness function involving four parameters,namely energy efficiency,inter-cluster distance,intra-cluster distance,and node density.A harmony search algorithm(HSA)with a cascaded recurrent neural network(CRNN)model can be used for an effective intrusion detection process.The design of HSA assists in the optimal selection of hyperparameters related to the CRNN model.A detailed experimental analysis of the QCSOBC-IDT model ensured its promising efficiency compared to existing models. 展开更多
关键词 Internet of things energy efficiency CLUSTERING intrusion detection deep learning security
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部