[PDF][PDF] Efficient clustering using ECATCH algorithm to extend network lifetime in wireless sensor networks
R Kumar, R Logeswari, N Devi… - Int. J. Eng. Trends …, 2017 - researchgate.net
The sensor nodes in wireless sensor networks normally execute only simple logics and
have limited resources. Faulty sensors deployed in wireless sensor networks produce …
have limited resources. Faulty sensors deployed in wireless sensor networks produce …
Impact of various parameters on Gauss Markov mobility model to support QoS in MANET
MF Khan, I Das - Cloud Computing Enabled Big-Data Analytics in …, 2022 - taylorfrancis.com
Mobile Ad-hoc Networks (MANETs) are wireless networks that communicate with other
nodes through radio waves without any infrastructure. The flexibility of this network is that it …
nodes through radio waves without any infrastructure. The flexibility of this network is that it …
[PDF][PDF] Consensus based algorithm to detecting malicious nodes in mobile adhoc network
RS Kumar, T Dhinesh, V Kathirresh - International Journal of …, 2016 - academia.edu
A wireless network is nothing but a group of nodes that transmit the data from one place to
the other, the transmission takes place with the help of ad-hoc network. The network is …
the other, the transmission takes place with the help of ad-hoc network. The network is …
Dynamic Network Intrusion Detection System for Virtual Machine Environment
The biggest issue right now is cloud security, which is why many experts have invested a lot
of time and energy into research and development over the past few years. Hackers could …
of time and energy into research and development over the past few years. Hackers could …
[PDF][PDF] An Improved Scalable Approach to Detect Black Spots on Roads Using DBSCAN Algorithm
Localization of road accident hotspots where the number of accidents is above expected
supported the quality values. The user will receive a notification while it localizes a disease …
supported the quality values. The user will receive a notification while it localizes a disease …
[PDF][PDF] Enhanced trust based architecture in MANET using AODV protocol to eliminate packet dropping attacks
RS Kumar, S Koperundevi… - International Journal of …, 2016 - researchgate.net
MANET is a multihop packet based wireless network composed of a set of mobile nodes that
can communicate and move at the same time, without using any kind of fixed wired …
can communicate and move at the same time, without using any kind of fixed wired …
Rooting Out Intruders Using Deep Learning Through RNN And Bilstm
S Pariselvam, R Sathishkumar, K Abitha… - … : Theory and Practice, 2024 - kuey.net
Protecting networks from harmful activity and illegal access is critical in the field of
cybersecurity. As the first line of defense in this regard, intrusion detection systems (IDS) are …
cybersecurity. As the first line of defense in this regard, intrusion detection systems (IDS) are …
New Modern Approach to Predict Users' Sentiment Using CNN and BLSTM
RS Kumar - International Journal of Informatics, Information System …, 2022 - ojs.unikom.ac.id
New Modern Approach to Predict Users’ Sentiment Using CNN and BLSTM International
Journal of Informatics, Information System a Page 1 183 | International Journal of …
Journal of Informatics, Information System a Page 1 183 | International Journal of …
[PDF][PDF] Image Enhancement using NHSI Model Employed in Color Retinal Images
RS Kumar, M Nivetha, G Madhumita, P Santhoshy - vol, 2018 - researchgate.net
To produce an enhanced retinal image using enhancement technique because uneven
illumination, image blurring, and low contrast retinal images with poor quality are not useful …
illumination, image blurring, and low contrast retinal images with poor quality are not useful …