We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 41-60 of 10,000 results
  1. Dcaro: Dynamic cluster formation and AUV-aided routing optimization for energy-efficient UASNs

    In Underwater Acoustic Sensor Networks (UASNs), optimizing energy efficiency and minimizing void occurrences in routing is paramount. Due to the...

    Kammula Sunil Kumar, Deepak Singh, Veena Anand in Peer-to-Peer Networking and Applications
    Article 12 July 2024
  2. Load Balancing in Cloud Environment Using Opposition Based Spider Monkey Optimization

    Using cloud computing, user can pool resources in a distributed environment. These resources can be accessed wherever and whenever the provider...

    Article 12 July 2024
  3. Flexible localization protocol for underwater wireless sensor networks using hybrid reward evaluation scheme

    Underwater Wireless Sensor Networks (UWSNs) must recognize sensor nodes and estimate their locations. A reliable underwater data forwarding relay is...

    Rupinder Kaur, Sonia Goyal in Peer-to-Peer Networking and Applications
    Article 12 July 2024
  4. Implementing Blockchain Technology in the Indian Context to Enable the Secure Exchange of Patients’ Information with Government Agencies

    The healthcare sector has endured significant challenges due to its incapacity to exchange sensitive patient information. Throughout the battle...

    Poonam Verma, Vikas Tripathi, Bhaskar Pant in Journal of The Institution of Engineers (India): Series B
    Article 12 July 2024
  5. Discreet: distributed delivery service with context-aware cooperation

    End-to-end encrypted messaging applications such as Signal became widely popular thanks to their capability to ensure the confidentiality and...

    Ludovic Paillat, Claudia-Lavinia Ignat, ... Amine Ismail in Annals of Telecommunications
    Article 11 July 2024
  6. Appropriate Mother Wavelet Selection with Optimum Level of Disintegration for Analyzing Various Faults of Induction Motor Under Variation in Motor Loading

    Current signature analysis is used successfully for induction motor fault detection. A common mathematical tool for assessing fault signals is the...

    Arunava Kabiraj Thakur, Alok Mukherjee, ... Arabinda Das in Journal of The Institution of Engineers (India): Series B
    Article 11 July 2024
  7. A Novel Method for Design and Implementation of Systolic Associative Cascaded Variable Leaky Least Mean Square Adaptive Filter for Denoising of ECG Signals

    Electrocardiogram is the most essential diagnostic test for heart disease detection in this era, where it has low frequency and small amplitude,...

    Chitra Manickam, Murugesan Govindasamy, ... Muneeshwari Paramasivam in Wireless Personal Communications
    Article 11 July 2024
  8. A powerful adversary model and corresponding OTP time slot allocation scheme in RIS-assisted physical layer key generation

    Physical layer key generation (PLKG) is a technique of information-theoretic security to tackle the problem of key distribution between...

    Liquan Chen, Yufan Song, ... Liang Chen in EURASIP Journal on Wireless Communications and Networking
    Article Open access 11 July 2024
  9. Multi-user directional modulation with reconfigurable holographic surfaces

    Large intelligent surfaces arise as an emerging technology and critical building block for sixth-generation (6G) wireless networks. Reconfigurable...

    M. Yaser Yağan, Samed Keşir, ... Ali Görçin in EURASIP Journal on Wireless Communications and Networking
    Article Open access 11 July 2024
  10. Efficient Hotel Rating Prediction from Reviews Using Ensemble Learning Technique

    Predicting hotel ratings from reviews involves natural language processing techniques to extract sentiment and features from text data, then applying...

    Mukesh Kumar, Chhotelal Kumar, ... S. Kavitha in Wireless Personal Communications
    Article 11 July 2024
  11. All Things will be Dominated/Controlled by Humans’ Imaginations in the Next Generation of Internet of Brains

    Fifty years ago, an intriguing concept was proposed that relied on Internet technology, known as the Internet of Things. Over time, this idea has...

    Saeed Banaeian Far, Azadeh Imani Rad in Wireless Personal Communications
    Article 11 July 2024
  12. An Iterative Convolutional Neural Network Based Malicious Node Detection (ICNNMND) Protocol For Internet of Things

    At present Internet of Things is widely used in various products and parts in our daily life. In the future, its uses and requirements will increase....

    Moemedi Moka, Karabo Serome, Rajalakshmi Selvaraj in Wireless Personal Communications
    Article 11 July 2024
  13. Performance Analysis of Computational Intelligence Correction

    Kalman filter (KF) is a widely used navigation algorithm, especially for precise positioning applications. However, the exact filter parameters must...

    Nalineekumari Arasavali, Sasibhushana Rao Gottapu in Wireless Personal Communications
    Article 11 July 2024
  14. Cluster-Based Hybrid Routing Technique for Wireless Sensor Networks

    While deploying wireless sensor networks (WSNs), the cluster heads need huge amount of energy according to the unbalanced routing of the Sensor nodes...

    Y. Harold Robinson, B. Valarmathi, ... Hanen Karamti in Wireless Personal Communications
    Article 10 July 2024
  15. Coverage Prediction for Target Coverage in WSN Using Machine Learning Approaches

    Mathematical programming techniques are widely used in the determination of optimal functional configuration of a wireless sensor network (WSN). But...

    Pooja Chaturvedi, A. K. Daniel, Vipul Narayan in Wireless Personal Communications
    Article 10 July 2024
  16. A revocable attribute-based access control with non-monotonic access structure

    Internet of Things (IoT) has revolutionized data manipulation across various applications, particularly in online healthcare paradigm, where medical...

    Maede Ashouri-Talouki, Nafiseh Kahani, ... Zomorod Abedini in Annals of Telecommunications
    Article 10 July 2024
  17. Geometry-Assisted Initial Access and Link Maintenance in mmWave 5G Communication Networks

    Beamforming using highly directional antennas is inevitable to compensate the propagation losses and enable communication in the millimeter wave...

    Ahmed S. Mubarak, Hamada Esmaiel, ... Usama S. Mohamed in Wireless Personal Communications
    Article 10 July 2024
  18. Adaptive connected hybrid beamforming for energy efficiency maximization in multi-user millimeter wave systems

    Energy efficiency (EE) is a key enabler for sustainable green millimeter wave (mmWave) communication. However, conventional hybrid beamforming...

    Guangyi Chen, Ruoyu Zhang, ... Wen Wu in Wireless Networks
    Article 10 July 2024
  19. Malicious node detection in wireless sensor network using modified sandpiper optimization algorithm

    The most crucial thing about the Wireless Sensor Network (WSN) application is the validation of dangerous as well as remote sensing fields, which are...

    B. Vijaya Nirmala, K. Selvaraj in Wireless Networks
    Article 10 July 2024
Did you find what you were looking for? Share feedback.