[PDF][PDF] A Machine Learning Solution for Bed Occupancy Issue in the Healthcare Sector

S Gochhait, SA Butt, E De-La-Hoz-Franco, Q Shaheen… - academia.edu
The health care domain is a culmination and emergence of many other economic sectors
that give different services from patient treatment to healing, protective, rehabilitation, and …

WBAN Issues and Challenges

M Umair - 2021 - eprints.rclis.org
With the growth of population enhanced the demands of assistive technologies, especially in
case of people with disabilities. The aim of monitor-ing health and assisting people leads to …

Securing data encryption

A Khurum - 2019 - engrxiv.org
This article provide analysis about information security using cryptography techniques. After
the analyzing different techniques of encryption, we are proposing Advance Encryption …

[PDF][PDF] Distributed denial-of-service attacks

A Silva - core.ac.uk
Distributed Denial-of-Service (DDoS) attacks are the intimidation trials on the Internet that
deplete the network bandwidth. Researchers have introduced various defense mechanisms …

Blackhole Attacks on DV-Hop Positioning in WSN

AK Kumar, RP Sam, K Madhavi - Journal of Algebraic Statistics, 2022 - publishoa.com
A simulation-based analysis of the impact of Blackhole attacks on DV-Hop based positioning
in wireless sensor networks is presented in this research. A wireless sensor grid is first …

Wireless LAN Tutorial

M Umair - 2021 - eprints.rclis.org
Wireless communication is the fast growing industry and will continue to evolve. A wireless
local area network (WLAN) is a flexible data communications system that use radio …

Review of 802.15. 6 Specifications and Challenges

MU Musadiq - eprints.rclis.org
with the growth of population enhanced the demands of assistive technologies, especially in
case of people with disabilities. The aim of monitoring health and assisting people leads to …

[PDF][PDF] Packet Drop Attack Detection Framework with the Concern of Node Failures and Intruders Presence

NH AMJ, GM Priscilla - Solid State Technology, 2020 - academia.edu
In mobile ad hoc network, most vulnerable threat is intrusion attacks, where normal packet
transmission behaviour is interrupted and leads to degradation in entire network …

Cooperative MAC Protocols for Mobile Communication Networks

S ADRIANA - 2021 - eprints.rclis.org
Cooperative communications is the general idea of pooling the resources of dis-tributed
nodes to improve the overall performance of a wireless network. In co-operative networks …

Ad-Hoc Network Tutorial

A Silva - eprints.rclis.org
Wireless communication is the fast growing industry and will continue to evolve. A wireless
local area network (WLAN) is a flexible data communications system that use radio …