Unmanned aerial vehicles (UAVs): Practical aspects, applications, open challenges, security issues, and future trends

SAH Mohsan, NQH Othman, Y Li, MH Alsharif… - Intelligent Service …, 2023 - Springer
Recently, unmanned aerial vehicles (UAVs) or drones have emerged as a ubiquitous and
integral part of our society. They appear in great diversity in a multiplicity of applications for …

A comprehensive and systematic literature review on the big data management techniques in the internet of things

A Naghib, N Jafari Navimipour, M Hosseinzadeh… - Wireless …, 2023 - Springer
Abstract The Internet of Things (IoT) is a communication paradigm and a collection of
heterogeneous interconnected devices. It produces large-scale distributed, and diverse data …

Interval dominance-based feature selection for interval-valued ordered data

W Li, H Zhou, W Xu, XZ Wang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Dominance-based rough approximation discovers inconsistencies from ordered criteria and
satisfies the requirement of the dominance principle between single-valued domains of …

CEDAR: A cluster-based energy-aware data aggregation routing protocol in the internet of things using capuchin search algorithm and fuzzy logic

M Mohseni, F Amirghafouri, B Pourghebleh - Peer-to-Peer Networking and …, 2023 - Springer
Over the last decade, the Internet of Things (IoT) has received much interest from the
research and industrial communities due to its fundamental role in altering the human …

Greedy opposition-based learning for chimp optimization algorithm

M Khishe - Artificial Intelligence Review, 2023 - Springer
The chimp optimization algorithm (ChOA) is a hunting-based model and can be utilized as a
set of optimization rules to tackle optimization problems. Although ChOA has shown …

Bridging the theoretical bound and deep algorithms for open set domain adaptation

L Zhong, Z Fang, F Liu, B Yuan… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
In the unsupervised open set domain adaptation (UOSDA), the target domain contains
unknown classes that are not observed in the source domain. Researchers in this area aim …

Multistage quality control in manufacturing process using blockchain with machine learning technique

J Gu, L Zhao, X Yue, NI Arshad… - Information Processing & …, 2023 - Elsevier
Abstract Information security has more demand for digital technology. Every industry
transfers its data through computer networks for legal communication. The Internet of Things …

ML‐DDoSnet: IoT intrusion detection based on denial‐of‐service attacks using machine learning methods and NSL‐KDD

M Esmaeili, SH Goki, BHK Masjidi… - Wireless …, 2022 - Wiley Online Library
The Internet of Things (IoT) is a complicated security feature in which datagrams are
protected by integrity, confidentiality, and authentication services. The network is protected …

Deep Q-learning technique for offloading offline/online computation in blockchain-enabled green IoT-edge scenarios

A Heidari, MA Jabraeil Jamali, N Jafari Navimipour… - Applied Sciences, 2022 - mdpi.com
The number of Internet of Things (IoT)-related innovations has recently increased
exponentially, with numerous IoT objects being invented one after the other. Where and how …

Pulse repetition interval modulation recognition using deep CNN evolved by extreme learning machines and IP-based BBO algorithm

SMH Azhdari, A Mahmoodzadeh, M Khishe… - … Applications of Artificial …, 2023 - Elsevier
Pulse repetition interval modulation (PRIM) recognition is a critical task in electronic
intelligence (ELINT) and electronic support measure (ESM) systems for detecting radar …