Unmanned aerial vehicles (UAVs): Practical aspects, applications, open challenges, security issues, and future trends
SAH Mohsan, NQH Othman, Y Li, MH Alsharif… - Intelligent Service …, 2023 - Springer
Recently, unmanned aerial vehicles (UAVs) or drones have emerged as a ubiquitous and
integral part of our society. They appear in great diversity in a multiplicity of applications for …
integral part of our society. They appear in great diversity in a multiplicity of applications for …
A comprehensive and systematic literature review on the big data management techniques in the internet of things
Abstract The Internet of Things (IoT) is a communication paradigm and a collection of
heterogeneous interconnected devices. It produces large-scale distributed, and diverse data …
heterogeneous interconnected devices. It produces large-scale distributed, and diverse data …
Interval dominance-based feature selection for interval-valued ordered data
Dominance-based rough approximation discovers inconsistencies from ordered criteria and
satisfies the requirement of the dominance principle between single-valued domains of …
satisfies the requirement of the dominance principle between single-valued domains of …
CEDAR: A cluster-based energy-aware data aggregation routing protocol in the internet of things using capuchin search algorithm and fuzzy logic
M Mohseni, F Amirghafouri, B Pourghebleh - Peer-to-Peer Networking and …, 2023 - Springer
Over the last decade, the Internet of Things (IoT) has received much interest from the
research and industrial communities due to its fundamental role in altering the human …
research and industrial communities due to its fundamental role in altering the human …
Greedy opposition-based learning for chimp optimization algorithm
M Khishe - Artificial Intelligence Review, 2023 - Springer
The chimp optimization algorithm (ChOA) is a hunting-based model and can be utilized as a
set of optimization rules to tackle optimization problems. Although ChOA has shown …
set of optimization rules to tackle optimization problems. Although ChOA has shown …
Bridging the theoretical bound and deep algorithms for open set domain adaptation
In the unsupervised open set domain adaptation (UOSDA), the target domain contains
unknown classes that are not observed in the source domain. Researchers in this area aim …
unknown classes that are not observed in the source domain. Researchers in this area aim …
Multistage quality control in manufacturing process using blockchain with machine learning technique
Abstract Information security has more demand for digital technology. Every industry
transfers its data through computer networks for legal communication. The Internet of Things …
transfers its data through computer networks for legal communication. The Internet of Things …
ML‐DDoSnet: IoT intrusion detection based on denial‐of‐service attacks using machine learning methods and NSL‐KDD
M Esmaeili, SH Goki, BHK Masjidi… - Wireless …, 2022 - Wiley Online Library
The Internet of Things (IoT) is a complicated security feature in which datagrams are
protected by integrity, confidentiality, and authentication services. The network is protected …
protected by integrity, confidentiality, and authentication services. The network is protected …
Deep Q-learning technique for offloading offline/online computation in blockchain-enabled green IoT-edge scenarios
The number of Internet of Things (IoT)-related innovations has recently increased
exponentially, with numerous IoT objects being invented one after the other. Where and how …
exponentially, with numerous IoT objects being invented one after the other. Where and how …
Pulse repetition interval modulation recognition using deep CNN evolved by extreme learning machines and IP-based BBO algorithm
Pulse repetition interval modulation (PRIM) recognition is a critical task in electronic
intelligence (ELINT) and electronic support measure (ESM) systems for detecting radar …
intelligence (ELINT) and electronic support measure (ESM) systems for detecting radar …