Literature review of Industry 4.0 and related technologies
Manufacturing industry profoundly impact economic and societal progress. As being a
commonly accepted term for research centers and universities, the Industry 4.0 initiative has …
commonly accepted term for research centers and universities, the Industry 4.0 initiative has …
Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN
K Thangaramya, K Kulothungan, S Indira Gandhi… - Soft Computing, 2020 - Springer
In wireless sensor networks (WSNs), energy optimization and the provision of security are
the major design challenges. Since the wireless sensor devices are energy constrained, the …
the major design challenges. Since the wireless sensor devices are energy constrained, the …
Energy-efficient secure QoS routing algorithm based on Elite Niche Clone evolutionary computing for WSN
M Xu, Y Zu, J Zhou, Y Liu, C Li - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
The wireless sensor network (WSN) profoundly impacts the routing technology of the
Internet of Things, which has received tremendous attention in terms of energy cost, Quality …
Internet of Things, which has received tremendous attention in terms of energy cost, Quality …
Performance Enhancement of Wireless Sensor Network Using Feisty Particle Swarm Optimization Protocol
L Mani, S Arumugam, R Jaganathan - Proceedings of the 4th …, 2022 - dl.acm.org
Energy conservation is the primary goal of all types of wireless sensor networks (WSNs),
which is why packet delivery and lifespan are improved. Due to various factors, energy …
which is why packet delivery and lifespan are improved. Due to various factors, energy …
A sanitization approach for privacy preserving data mining on social distributed environment
PL Lekshmy, MA Rahiman - Journal of Ambient Intelligence and …, 2020 - Springer
Data owners worry about their private data in the information that is being uncovered without
authorization in the cloud computing environment. While applying privacy preserving …
authorization in the cloud computing environment. While applying privacy preserving …
A new energy efficient hierarchical routing protocol for wireless sensor networks
M Dener - Wireless Personal Communications, 2018 - Springer
Wireless sensor networks consist of low cost sensor nodes which have limited power
supplies, memory capacity, processing capability and transmission rate. Sensor nodes …
supplies, memory capacity, processing capability and transmission rate. Sensor nodes …
Secure coronas based zone clustering and routing model for distributed wireless sensor networks
M Revanesh, V Sridhar, JM Acken - Wireless Personal Communications, 2020 - Springer
Abstract Distributed Wireless Sensor Networks (DWSNs) comprised of set of sensor nodes
that are geographically distributed in harsh environments. However, a centralized WSN …
that are geographically distributed in harsh environments. However, a centralized WSN …
A misdirected route avoidance using random waypoint mobility model in wireless sensor network
P Vijayalakshmi, K Selvi, K Gowsic… - Wireless …, 2021 - Springer
In this paper, a novel method is proposed to reduce the number of route misdirection to
increase network throughput. This method increases the network throughput by accurately …
increase network throughput. This method increases the network throughput by accurately …
Optimization based multi-objective weighted clustering for remote monitoring system in WSN
TM Thekkil, N Prabakaran - Wireless Personal Communications, 2021 - Springer
Abstract Wireless Sensor Network (WSN) is generally considered as a standout amongst the
most critical advancements for the twenty-first century, it normally comprises multifunctional …
most critical advancements for the twenty-first century, it normally comprises multifunctional …
A Random Waypoint Model for Route Avoidance with Zone Routing Protocol in Wireless Sensor Network
P Vijayalakshmi, K Selvi, K Gowsic - Wireless Personal Communications, 2023 - Springer
An innovative technique to lower path mistakes is suggested in this research. The method
increases network throughput in the following ways: packets are successfully transmitted …
increases network throughput in the following ways: packets are successfully transmitted …