[PDF][PDF] Efficient clustering using ECATCH algorithm to extend network lifetime in wireless sensor networks

R Kumar, R Logeswari, N Devi… - Int. J. Eng. Trends …, 2017 - researchgate.net
The sensor nodes in wireless sensor networks normally execute only simple logics and
have limited resources. Faulty sensors deployed in wireless sensor networks produce …

Impact of various parameters on Gauss Markov mobility model to support QoS in MANET

MF Khan, I Das - Cloud Computing Enabled Big-Data Analytics in …, 2022 - taylorfrancis.com
Mobile Ad-hoc Networks (MANETs) are wireless networks that communicate with other
nodes through radio waves without any infrastructure. The flexibility of this network is that it …

[PDF][PDF] Consensus based algorithm to detecting malicious nodes in mobile adhoc network

RS Kumar, T Dhinesh, V Kathirresh - International Journal of …, 2016 - academia.edu
A wireless network is nothing but a group of nodes that transmit the data from one place to
the other, the transmission takes place with the help of ad-hoc network. The network is …

Dynamic Network Intrusion Detection System for Virtual Machine Environment

G Kadiravan, P Sathish, D Preethi… - 2023 International …, 2023 - ieeexplore.ieee.org
The biggest issue right now is cloud security, which is why many experts have invested a lot
of time and energy into research and development over the past few years. Hackers could …

[PDF][PDF] An Improved Scalable Approach to Detect Black Spots on Roads Using DBSCAN Algorithm

R Kumar, K Lokesh, V Shankar… - Asian Journal of …, 2021 - researchgate.net
Localization of road accident hotspots where the number of accidents is above expected
supported the quality values. The user will receive a notification while it localizes a disease …

[PDF][PDF] Enhanced trust based architecture in MANET using AODV protocol to eliminate packet dropping attacks

RS Kumar, S Koperundevi… - International Journal of …, 2016 - researchgate.net
MANET is a multihop packet based wireless network composed of a set of mobile nodes that
can communicate and move at the same time, without using any kind of fixed wired …

Rooting Out Intruders Using Deep Learning Through RNN And Bilstm

S Pariselvam, R Sathishkumar, K Abitha… - … : Theory and Practice, 2024 - kuey.net
Protecting networks from harmful activity and illegal access is critical in the field of
cybersecurity. As the first line of defense in this regard, intrusion detection systems (IDS) are …

New Modern Approach to Predict Users' Sentiment Using CNN and BLSTM

RS Kumar - International Journal of Informatics, Information System …, 2022 - ojs.unikom.ac.id
New Modern Approach to Predict Users’ Sentiment Using CNN and BLSTM International
Journal of Informatics, Information System a Page 1 183 | International Journal of …

[PDF][PDF] Image Enhancement using NHSI Model Employed in Color Retinal Images

RS Kumar, M Nivetha, G Madhumita, P Santhoshy - vol, 2018 - researchgate.net
To produce an enhanced retinal image using enhancement technique because uneven
illumination, image blurring, and low contrast retinal images with poor quality are not useful …