[HTML][HTML] A protocol layer trust-based intrusion detection scheme for wireless sensor networks
J Wang, S Jiang, AO Fapojuwo - Sensors, 2017 - mdpi.com
This article proposes a protocol layer trust-based intrusion detection scheme for wireless
sensor networks. Unlike existing work, the trust value of a sensor node is evaluated …
sensor networks. Unlike existing work, the trust value of a sensor node is evaluated …
Anomaly detection in wireless sensor networks using immune-based bioinspired mechanism
During the past few years, we have seen a tremendous increase in various kinds of
anomalies in Wireless Sensor Network (WSN) communication. Recently, researchers have …
anomalies in Wireless Sensor Network (WSN) communication. Recently, researchers have …
Evaluating the effectiveness of Wrapper feature selection methods with artificial neural network classifier for diabetes prediction
MA Fahmiin, TH Lim - Testbeds and Research Infrastructures for the …, 2020 - Springer
Feature selection is an important preprocessing technique used to determine the most
important features that contributes to the classification of a dataset, typically performed on …
important features that contributes to the classification of a dataset, typically performed on …
Medication adherence using non-intrusive wearable sensors
TH Lim, AH Abdullah - EAI Endorsed Transactions on Ambient Systems, 2017 - eudl.eu
Activity recognition approaches have been applied in home ambient systems to monitor the
status and well-being of occupant especially for home care systems. With the advancement …
status and well-being of occupant especially for home care systems. With the advancement …
Evaluating recursive backtracking depth-first search algorithm in unknown search space for self-learning path finding robot
TH Lim, PL Ng - Artificial Intelligence for Communications and Networks …, 2021 - Springer
Various path or route solving algorithms have been widely researched for the last 30 years.
It has been applied in many different robotic systems such as bomb sniffing robots, path …
It has been applied in many different robotic systems such as bomb sniffing robots, path …
Bio-inspired self-healing routing to improve lifetime of wireless sensor networks
CBN Lakshmi, SKM Rao - 2014 International Conference on …, 2014 - ieeexplore.ieee.org
Recent advances in Compact and wireless embedded Systems coupled with the
technological innovations in Micro Electro Mechanical Systems (MEMS), Wireless …
technological innovations in Micro Electro Mechanical Systems (MEMS), Wireless …
Smartmates for medication adherence using non-intrusive wearable sensors
AH Abdullah, TH Lim - … , MobiHealth 2016, Milan, Italy, November 14-16 …, 2017 - Springer
According to the National institute on Aging, 8% of the world's population is over 65 or older.
There is a need for a long term care and a remote home-care environment for the aging …
There is a need for a long term care and a remote home-care environment for the aging …
Non-intrusive wearable health monitoring systems for emotion detection
D Norhafizah, B Pg, TH Lim, NS Binti… - 2017 12th IEEE …, 2017 - ieeexplore.ieee.org
Anxiety and Stress caused by the visit to the health centre or hospital are very common
among children and adult. White Coat Syndrome or Iatrophobia can make diagnostic of a …
among children and adult. White Coat Syndrome or Iatrophobia can make diagnostic of a …
A deep reinforcement learning based homeostatic system for unmanned position control
Deep Reinforcement Learning (DRL) has been proven to be capable of designing an
optimal control theory by minimising the error in dynamic systems. However, in many of the …
optimal control theory by minimising the error in dynamic systems. However, in many of the …
A bio-inspired load balancing technique for wireless sensor networks
I Caliskanelli - 2014 - etheses.whiterose.ac.uk
Wireless Sensor Networks (WSNs) consist of multiple distributed nodes each with limited
resources. With their strict resource constraints and application-specific characteristics …
resources. With their strict resource constraints and application-specific characteristics …