Robust and secure data transmission using artificial intelligence techniques in ad-hoc networks

P Rani, Kavita, S Verma, N Kaur, M Wozniak, J Shafi… - Sensors, 2021 - mdpi.com
The paper presents a new security aspect for a Mobile Ad-Hoc Network (MANET)-based IoT
model using the concept of artificial intelligence. The Black Hole Attack (BHA) is considered …

FANET: Efficient routing in flying ad hoc networks (FANETs) using firefly algorithm

M Kaur, A Singh, S Verma, Kavita, NZ Jhanjhi… - … and Innovation on Data …, 2021 - Springer
In recent years, the use of emerging technologies and the role of flying ad hoc networks
(FANETs) have rapidly changed. Flying ad hoc networks are generally used in different …

Game Theory-based UAV-Cloud for Service Selection Architecture in Flying Ad Hoc Networks

B Brik, FE Abukhres, A Algaddafi… - IEEE Open Journal of …, 2024 - ieeexplore.ieee.org
The rapid progression of Cloud Computing (CC) technology has ushered in innovative
ecosystem concepts such as Mobile Cloud Computing (MCC). In this context, the …

SC-MCHMP: Score-Based Cluster Level Hybrid Multi-Channel MAC Protocol for Wireless Sensor Network

S Ramisetty, D Anand, S Verma… - Information Security …, 2022 - api.taylorfrancis.com
Energy efficiency plays a significant role in the conventional WSNs for improving the network
lifetime with the requirements of quality of services (QoS), such as delay and bandwidth …

Software-defined networking for flying ad-hoc network security: A survey

M Abdelhafidh, N Charef, AB Mnaouer… - … Conference of Smart …, 2022 - ieeexplore.ieee.org
Despite the immense use of single Unmanned Aerial Vehicle (UAV) systems in various
applications, it is not yet able to cover large areas with optimized energy consumption …

User Interface based Text-To-Speech Synthesizer

Y Khandelwal, R Goyal, P Negi - 2024 IEEE 1st Karachi …, 2024 - ieeexplore.ieee.org
Speech is one of the most ancient and native ways for humans to share information.
Attempts to construct vocally interactive computers to realize voice/speech synthesis have …

[PDF][PDF] Kavita

P Rani - Verma, S - academia.edu
The paper presents a new security aspect for a Mobile Ad-Hoc Network (MANET)-based IoT
model using the concept of artificial intelligence. The Black Hole Attack (BHA) is considered …

Two level security combining DNA cryptography and image steganography

A Sagar, SS Saini, J Singh - 2023 - IET
Technology has been uplifting in the past few years. And, with this rise, there has also been
an increase in the security threats dealt with by regular users. Due to this, security regarding …

[PDF][PDF] Comparative analysis of minmax algorithm with alpha-beta pruning optimization for chess engine

R Sahay - ijaem.net
The chess game engine is introduced which makes use of a Minmax algorithm for searching
game trees and makes use of alpha-beta pruning algorithm to reduce the search space of …