Energy optimization techniques in underwater internet of things: issues, state-of-the-art, and future directions
DR Kesari Mary, E Ko, DJ Yoon, SY Shin, SH Park - Water, 2022 - mdpi.com
The underwater internet of things (UIoT) has emerged as a booming technology in today's
digital world due to the enhancement of a wide range of underwater applications concerning …
digital world due to the enhancement of a wide range of underwater applications concerning …
Data redundancy reduction for energy-efficiency in wireless sensor networks: A comprehensive review
Wireless Sensor Networks (WSNs) play a significant role in providing an extraordinary
infrastructure for monitoring environmental variations such as climate change, volcanoes …
infrastructure for monitoring environmental variations such as climate change, volcanoes …
Detection of DDOS attack using deep learning model in cloud storage application
In recent years, distributed denial of service (DDoS) attacks pose a serious threat to network
security. How to detect and defend against DDoS attacks is currently a hot topic in both …
security. How to detect and defend against DDoS attacks is currently a hot topic in both …
Energy efficient architecture for mitigating the hot-spot problem in wireless sensor networks
In wireless sensor networks (WSNs), mutual coordination of cluster heads (CHs) is essential
to transmit their data towards the sink node through many-hop fashion. As a result of this …
to transmit their data towards the sink node through many-hop fashion. As a result of this …
An FPGA-based performance evaluation of artificial neural network architecture algorithm for IoT
Nowadays, the high number of devices and applications connected to the Internet has
generated a great amount of data being which makes privacy and protection a more …
generated a great amount of data being which makes privacy and protection a more …
EESSMT: an energy efficient hybrid scheme for securing mobile ad hoc networks using IoT
Mobile ad hoc networks are attaining popularity to its highest currently, as the users need
wireless connectivity regardless of their geographical location. Threats of security attacks …
wireless connectivity regardless of their geographical location. Threats of security attacks …
Machine learning based detection and a novel EC-BRTT algorithm based prevention of DoS attacks in wireless sensor networks
K Lakshmi Narayanan, R Santhana Krishnan… - Wireless Personal …, 2021 - Springer
Wireless sensor network allows nodes to communicate with another using wireless
channels so that it is necessary for packet delivery to the nodes. Black hole attack occurs …
channels so that it is necessary for packet delivery to the nodes. Black hole attack occurs …
Line monitoring and identification based on roadmap towards edge computing
In recent years, with the rapid growth of Internet of Things (IoT) and cloud services having
received special attention from the research community across the world. IoT provides a …
received special attention from the research community across the world. IoT provides a …
[PDF][PDF] DDoS Attack Detection in Cloud Computing Based on Ensemble Feature Selection and Deep Learning.
Y Sanjalawe, T Althobaiti - Computers, Materials & Continua, 2023 - cdn.techscience.cn
Intrusion Detection System (IDS) in the cloud Computing (CC) environment has received
paramount interest over the last few years. Among the latest approaches, Deep Learning …
paramount interest over the last few years. Among the latest approaches, Deep Learning …
3-dimensional manifold and machine learning based localization algorithm for wireless sensor networks
YH Robinson, S Vimal, EG Julie… - Wireless Personal …, 2022 - Springer
The minimized amount of Localization accuracy is one of the common issues in Wireless
sensor networks. The determination of unknown nodes in a network needs good localization …
sensor networks. The determination of unknown nodes in a network needs good localization …