Search
Search Results
-
Dcaro: Dynamic cluster formation and AUV-aided routing optimization for energy-efficient UASNs
In Underwater Acoustic Sensor Networks (UASNs), optimizing energy efficiency and minimizing void occurrences in routing is paramount. Due to the...
-
Load Balancing in Cloud Environment Using Opposition Based Spider Monkey Optimization
Using cloud computing, user can pool resources in a distributed environment. These resources can be accessed wherever and whenever the provider...
-
Flexible localization protocol for underwater wireless sensor networks using hybrid reward evaluation scheme
Underwater Wireless Sensor Networks (UWSNs) must recognize sensor nodes and estimate their locations. A reliable underwater data forwarding relay is...
-
Implementing Blockchain Technology in the Indian Context to Enable the Secure Exchange of Patients’ Information with Government Agencies
The healthcare sector has endured significant challenges due to its incapacity to exchange sensitive patient information. Throughout the battle...
-
Discreet: distributed delivery service with context-aware cooperation
End-to-end encrypted messaging applications such as Signal became widely popular thanks to their capability to ensure the confidentiality and...
-
Appropriate Mother Wavelet Selection with Optimum Level of Disintegration for Analyzing Various Faults of Induction Motor Under Variation in Motor Loading
Current signature analysis is used successfully for induction motor fault detection. A common mathematical tool for assessing fault signals is the...
-
A Novel Method for Design and Implementation of Systolic Associative Cascaded Variable Leaky Least Mean Square Adaptive Filter for Denoising of ECG Signals
Electrocardiogram is the most essential diagnostic test for heart disease detection in this era, where it has low frequency and small amplitude,...
-
A powerful adversary model and corresponding OTP time slot allocation scheme in RIS-assisted physical layer key generation
Physical layer key generation (PLKG) is a technique of information-theoretic security to tackle the problem of key distribution between...
-
Multi-user directional modulation with reconfigurable holographic surfaces
Large intelligent surfaces arise as an emerging technology and critical building block for sixth-generation (6G) wireless networks. Reconfigurable...
-
Efficient Hotel Rating Prediction from Reviews Using Ensemble Learning Technique
Predicting hotel ratings from reviews involves natural language processing techniques to extract sentiment and features from text data, then applying...
-
All Things will be Dominated/Controlled by Humans’ Imaginations in the Next Generation of Internet of Brains
Fifty years ago, an intriguing concept was proposed that relied on Internet technology, known as the Internet of Things. Over time, this idea has...
-
An Iterative Convolutional Neural Network Based Malicious Node Detection (ICNNMND) Protocol For Internet of Things
At present Internet of Things is widely used in various products and parts in our daily life. In the future, its uses and requirements will increase....
-
Performance Analysis of Computational Intelligence Correction
Kalman filter (KF) is a widely used navigation algorithm, especially for precise positioning applications. However, the exact filter parameters must...
-
Cluster-Based Hybrid Routing Technique for Wireless Sensor Networks
While deploying wireless sensor networks (WSNs), the cluster heads need huge amount of energy according to the unbalanced routing of the Sensor nodes...
-
Coverage Prediction for Target Coverage in WSN Using Machine Learning Approaches
Mathematical programming techniques are widely used in the determination of optimal functional configuration of a wireless sensor network (WSN). But...
-
A revocable attribute-based access control with non-monotonic access structure
Internet of Things (IoT) has revolutionized data manipulation across various applications, particularly in online healthcare paradigm, where medical...
-
Geometry-Assisted Initial Access and Link Maintenance in mmWave 5G Communication Networks
Beamforming using highly directional antennas is inevitable to compensate the propagation losses and enable communication in the millimeter wave...
-
Adaptive connected hybrid beamforming for energy efficiency maximization in multi-user millimeter wave systems
Energy efficiency (EE) is a key enabler for sustainable green millimeter wave (mmWave) communication. However, conventional hybrid beamforming...
-
Malicious node detection in wireless sensor network using modified sandpiper optimization algorithm
The most crucial thing about the Wireless Sensor Network (WSN) application is the validation of dangerous as well as remote sensing fields, which are...