CHHP: coverage optimization and hole healing protocol using sleep and wake-up concept for wireless sensor network
The sensor network facilitates easy monitoring in hazardous environments like forests war
fields, etc. The wireless sensor network comprises several sensor nodes (SN) to observe …
fields, etc. The wireless sensor network comprises several sensor nodes (SN) to observe …
Design and implementation of intelligent monitoring system for platform security gate based on wireless communication technology using ML
C Li, H Niu, M Shabaz, K Kajal - International Journal of System Assurance …, 2022 - Springer
The platform safety gate is important safety protection equipment in urban rail transit, which
makes the rail area relatively independent from the platform waiting area, ensures the safety …
makes the rail area relatively independent from the platform waiting area, ensures the safety …
Proposed model for secured data storage in decentralized cloud by blockchain ethereum
Since cloud computing is an essential component of any modern company (usually
accounting for a considerable share of information technology (IT) infrastructure investment) …
accounting for a considerable share of information technology (IT) infrastructure investment) …
Collaborative analysis of audio-visual speech synthesis with sensor measurements for regulating human–robot interaction
We reside in an environment wherein robotics is used in a variety of circumstances daily. In
the best-case scenario, this contact seems as natural and comfortable as human-to-human …
the best-case scenario, this contact seems as natural and comfortable as human-to-human …
Comprehensive analysis on sensor node fault management schemes in wireless sensor networks
N Babu, SVN Santhosh Kumar - International Journal of …, 2022 - Wiley Online Library
Wireless sensor networks (WSNs) are ad hoc networks that consist of tiny sensor nodes
deployed in the sensed environment to monitor the natural phenomenon and send the …
deployed in the sensed environment to monitor the natural phenomenon and send the …
Enhance data availability and network consistency using artificial neural network for IoT
IoT networks have become famous and utilized in many industries such as agriculture,
medical, manufacture, and others due to their efficiency and productivity. WSN is an IoT …
medical, manufacture, and others due to their efficiency and productivity. WSN is an IoT …
Review of artificial intelligence techniques used in IoT networks
Artificial intelligence (AI) is an effective and efficient solution to manage and analyse data
flow in any network. Internet of things (IoT) has quickly attracted significant global attention …
flow in any network. Internet of things (IoT) has quickly attracted significant global attention …
Influencing factors identification in smart society for insider threat in law enforcement agency using a mixed method approach
K Kisenasamy, S Perumal, V Raman… - International Journal of …, 2021 - Springer
One of the main principle goals for threat protection is to understand the behavior of the
employee. An employee who is trusted will have the potential to cause more harm to the …
employee. An employee who is trusted will have the potential to cause more harm to the …
[PDF][PDF] System Penetration: Concepts, Attack Methods, and Defense Strategies
MT Quasim, AN Al Hawi, M Meraj - 2023 - easychair.org
Penetration testing has become an integral part of a comprehensive security program. Pen
tests are conducted by ethical hackers to mimic the strategies and actions of the attacker …
tests are conducted by ethical hackers to mimic the strategies and actions of the attacker …
Federated Learning in Mesh Networks
X Wang, Y Chen, OA Dobre - Artificial Intelligence for Future …, 2025 - Wiley Online Library
Federated learning, emphasizing decentralized machine learning without central data
aggregation, has expanded notably, attributed to its data privacy benefits and reduced …
aggregation, has expanded notably, attributed to its data privacy benefits and reduced …