We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. A semantic-based model with a hybrid feature engineering process for accurate spam detection

    Detecting spam emails is essential to maintaining the security and integrity of email communication. Existing research has made significant progress...

    Chira N. Mohammed, Ayah M. Ahmed in Journal of Electrical Systems and Information Technology
    Article Open access 15 July 2024
  2. Review of Deep Learning Techniques for Neurological Disorders Detection

    Neurological disease is one of the most common types of dementia that predominantly concerns the elderly. In clinical approaches, identifying its...

    Akhilesh Kumar Tripathi, Rafeeq Ahmed, Arvind Kumar Tiwari in Wireless Personal Communications
    Article 14 July 2024
  3. Energy Efficient Routing in Cluster Based Heterogeneous Wireless Sensor Network Using Hybrid GWO and Firefly Algorithm

    Object tracking application is one of the important as well as challenging application of energy constrained Wireless Sensor Network (WSN).Timely and...

    Jayashree Dev, Jibitesh Mishra in Wireless Personal Communications
    Article 14 July 2024
  4. EFTVG: An Energy Efficient Fuzzy–Timer Clustering Approach in an Adaptive Virtual Grid Cluster Based WSN

    Clustering is an effective way that improves WSN lifetime. In this paper, unlike the other approaches, an adaptive virtual grid is conducted to form...

    Armin Mazinani, Sayyed Majid Mazinani, Mohammed Jasim Mohammed Alyasiri in Wireless Personal Communications
    Article 13 July 2024
  5. Dcaro: Dynamic cluster formation and AUV-aided routing optimization for energy-efficient UASNs

    In Underwater Acoustic Sensor Networks (UASNs), optimizing energy efficiency and minimizing void occurrences in routing is paramount. Due to the...

    Kammula Sunil Kumar, Deepak Singh, Veena Anand in Peer-to-Peer Networking and Applications
    Article 12 July 2024
  6. Load Balancing in Cloud Environment Using Opposition Based Spider Monkey Optimization

    Using cloud computing, user can pool resources in a distributed environment. These resources can be accessed wherever and whenever the provider...

    Article 12 July 2024
  7. Flexible localization protocol for underwater wireless sensor networks using hybrid reward evaluation scheme

    Underwater Wireless Sensor Networks (UWSNs) must recognize sensor nodes and estimate their locations. A reliable underwater data forwarding relay is...

    Rupinder Kaur, Sonia Goyal in Peer-to-Peer Networking and Applications
    Article 12 July 2024
  8. Discreet: distributed delivery service with context-aware cooperation

    End-to-end encrypted messaging applications such as Signal became widely popular thanks to their capability to ensure the confidentiality and...

    Ludovic Paillat, Claudia-Lavinia Ignat, ... Amine Ismail in Annals of Telecommunications
    Article 11 July 2024
  9. A Novel Method for Design and Implementation of Systolic Associative Cascaded Variable Leaky Least Mean Square Adaptive Filter for Denoising of ECG Signals

    Electrocardiogram is the most essential diagnostic test for heart disease detection in this era, where it has low frequency and small amplitude,...

    Chitra Manickam, Murugesan Govindasamy, ... Muneeshwari Paramasivam in Wireless Personal Communications
    Article 11 July 2024
  10. Efficient Hotel Rating Prediction from Reviews Using Ensemble Learning Technique

    Predicting hotel ratings from reviews involves natural language processing techniques to extract sentiment and features from text data, then applying...

    Mukesh Kumar, Chhotelal Kumar, ... S. Kavitha in Wireless Personal Communications
    Article 11 July 2024
  11. All Things will be Dominated/Controlled by Humans’ Imaginations in the Next Generation of Internet of Brains

    Fifty years ago, an intriguing concept was proposed that relied on Internet technology, known as the Internet of Things. Over time, this idea has...

    Saeed Banaeian Far, Azadeh Imani Rad in Wireless Personal Communications
    Article 11 July 2024
  12. An Iterative Convolutional Neural Network Based Malicious Node Detection (ICNNMND) Protocol For Internet of Things

    At present Internet of Things is widely used in various products and parts in our daily life. In the future, its uses and requirements will increase....

    Moemedi Moka, Karabo Serome, Rajalakshmi Selvaraj in Wireless Personal Communications
    Article 11 July 2024
  13. Performance Analysis of Computational Intelligence Correction

    Kalman filter (KF) is a widely used navigation algorithm, especially for precise positioning applications. However, the exact filter parameters must...

    Nalineekumari Arasavali, Sasibhushana Rao Gottapu in Wireless Personal Communications
    Article 11 July 2024
  14. Cluster-Based Hybrid Routing Technique for Wireless Sensor Networks

    While deploying wireless sensor networks (WSNs), the cluster heads need huge amount of energy according to the unbalanced routing of the Sensor nodes...

    Y. Harold Robinson, B. Valarmathi, ... Hanen Karamti in Wireless Personal Communications
    Article 10 July 2024
  15. Coverage Prediction for Target Coverage in WSN Using Machine Learning Approaches

    Mathematical programming techniques are widely used in the determination of optimal functional configuration of a wireless sensor network (WSN). But...

    Pooja Chaturvedi, A. K. Daniel, Vipul Narayan in Wireless Personal Communications
    Article 10 July 2024
  16. A revocable attribute-based access control with non-monotonic access structure

    Internet of Things (IoT) has revolutionized data manipulation across various applications, particularly in online healthcare paradigm, where medical...

    Maede Ashouri-Talouki, Nafiseh Kahani, ... Zomorod Abedini in Annals of Telecommunications
    Article 10 July 2024
  17. Malicious node detection in wireless sensor network using modified sandpiper optimization algorithm

    The most crucial thing about the Wireless Sensor Network (WSN) application is the validation of dangerous as well as remote sensing fields, which are...

    B. Vijaya Nirmala, K. Selvaraj in Wireless Networks
    Article 10 July 2024
  18. Adaptive connected hybrid beamforming for energy efficiency maximization in multi-user millimeter wave systems

    Energy efficiency (EE) is a key enabler for sustainable green millimeter wave (mmWave) communication. However, conventional hybrid beamforming...

    Guangyi Chen, Ruoyu Zhang, ... Wen Wu in Wireless Networks
    Article 10 July 2024
  19. Geometry-Assisted Initial Access and Link Maintenance in mmWave 5G Communication Networks

    Beamforming using highly directional antennas is inevitable to compensate the propagation losses and enable communication in the millimeter wave...

    Ahmed S. Mubarak, Hamada Esmaiel, ... Usama S. Mohamed in Wireless Personal Communications
    Article 10 July 2024
Did you find what you were looking for? Share feedback.