An attention‐based deep learning model for traffic flow prediction using spatiotemporal features towards sustainable smart city

B Vijayalakshmi, K Ramar, NZ Jhanjhi… - International Journal …, 2021 - Wiley Online Library
In the development of smart cities, the intelligent transportation system (ITS) plays a major
role. The dynamic and chaotic nature of the traffic information makes the accurate …

An FPGA-based performance evaluation of artificial neural network architecture algorithm for IoT

AAM Teodoro, OSM Gomes, M Saadi, BA Silva… - Wireless Personal …, 2022 - Springer
Nowadays, the high number of devices and applications connected to the Internet has
generated a great amount of data being which makes privacy and protection a more …

CTrust‐RPL: A control layer‐based trust mechanism for supporting secure routing in routing protocol for low power and lossy networks‐based Internet of Things …

T ul Hassan, M Asim, T Baker… - Transactions on …, 2021 - Wiley Online Library
Abstract Internet of Things (IoT) fostered a new epoch of innovation by interconnecting
digital devices to make human life more convenient and attractive. These smart objects are …

Optimization using artificial bee colony based clustering approach for big data

SS Ilango, S Vimal, M Kaliappan, P Subbulakshmi - Cluster Computing, 2019 - Springer
As one of the major problems is that the time taken for executing the traditional algorithm is
larger and that it is very difficult for processing large amount of data. Clusters possess high …

Line monitoring and identification based on roadmap towards edge computing

Y Liu, Q Sun, A Sharma, A Sharma… - Wireless personal …, 2022 - Springer
In recent years, with the rapid growth of Internet of Things (IoT) and cloud services having
received special attention from the research community across the world. IoT provides a …

Mitigating eavesdropping by using fuzzy based MDPOP-Q learning approach and multilevel Stackelberg game theoretic approach in wireless CRN

P Subbulakshmi, M Prakash - Cognitive Systems Research, 2018 - Elsevier
The secrecy rate of physical layer security in the presence of eavesdropper of a Cognitive
Radio Network (CRN) via multilevel Stackelberg Game is enhanced. Primary propagator …

Predictive big data analytic on demonetization data using support vector machine

N Kannan, S Sivasubramanian, M Kaliappan, S Vimal… - Cluster …, 2019 - Springer
Predictive analytics is the branch of the advanced analytics which makes the user to predict
the future events with current statistics. The patterns found in historical and transactional …

Retracted article: secure storage allocation scheme using fuzzy based heuristic algorithm for cloud

M Sivaram, M Kaliappan, SJ Shobana… - Journal of Ambient …, 2021 - Springer
Cloud computing is a paradigm in the modern era for the development of secure storage
and secure job scheduling process in a cloud-based system. The cloud technology provides …

Honest auction based spectrum assignment and exploiting spectrum sensing data falsification attack using stochastic game theory in wireless cognitive radio network

P Subbulakshmi, M Prakash… - Wireless Personal …, 2018 - Springer
Cognitive radio networks being a widespread disruptive technology where idle spectrum are
being analysed and made available to the unlicensed secondary users (SU) from licensed …

Q learning MDP approach to mitigate jamming attack using Stochastic game theory modelling with WQLA in cognitive radio networks

S Vimal, YH Robinson, M Kaliappan… - Journal of platform …, 2021 - dbpia.co.kr
Cognitive Radio network (CR) is a promising paradigm that helps the unlicensed user
(Secondary User) to analyse the spectrum and coordinate the spectrum access to support …