Cross domain-based ontology construction via Jaccard Semantic Similarity with hybrid optimization model

S Kakad, S Dhage - Expert Systems with Applications, 2021 - Elsevier
Semantic web technology seems to be in the infant stage as only little efforts have been
taken on ontology construction with cross-domain application. This paper intends to take an …

[HTML][HTML] A semantic theory of the Internet of Things

R Lanotte, M Merro - Information and Computation, 2018 - Elsevier
We propose a process calculus for modelling and reasoning on systems in the Internet of
Things paradigm. Our systems interact both with the physical environment, via sensors and …

Cluster head selection framework for risk awareness enabled IoT networks using ant lion optimisation approach

M Sindhuja, K Selvamani - Wireless Personal Communications, 2019 - Springer
Owing to the ability to enable an extensive range of applications, Internet of Things (IoT)
receives huge research interest and it has major influence on ubiquitous computing. In …

Adaptive Mobility Target Tracking with Metaheuristic Aided Target Movement Prediction Scheme in Wireless Sensor Network

N Ramadevi, MV Subramanyam, CS Bindu - Wireless Personal …, 2024 - Springer
Mobile target tracking is one of the most important applications in wireless sensor networks
(WSNs), particularly for surveillance purposes. The tracking accuracy is highly dependent on …

[HTML][HTML] Sistema de valoración funcional para sistemas de aeronavegación no tripulados a partir de la calidad de la información

L Serna-Guarín, JD Grajales-Bustamante, M Becerra - Iteckne, 2021 - scielo.org.co
Los sistemas de aeronavegación no tripulados son utilizados en múltiples aplicaciones
militares y no militares. Sin embargo, estos sistemas son susceptibles de ser intervenidos …

Sistema de valoración funcional para sistemas de aeronavegación no tripulados a partir de la calidad de la información

L Serna, JD Grajales-Bustamante, M Becerra - ITECKNE, 2021 - revistas.ustabuca.edu.co
Unmanned aerial navigation systems are not used in many military and non-military
applications. However, these systems are susceptible be operated by hackers partially or …

[引用][C] Neighbour Selection Framework For Security Enabled Wireless Networks Networks Using Ant Lion Optimization Approach