A survey and recent advances in black widow optimization: variants and applications

M Shehab, MKY Shambour, MA Abu Hashem… - Neural Computing and …, 2024 - Springer
Artificial Intelligence techniques, such as optimization algorithms, have become essential for
success in many fields. Therefore, most researchers, especially in computer and …

Taylor Remora optimization enabled deep learning algorithms for percentage of pesticide detection in grapes

VS Bajait, N Malarvizhi - Environmental Science and Pollution Research, 2023 - Springer
In the world, grapes are considered as the most significant fruit, and it comprises various
nutrients, like Vitamin C and it is utilized to produce wines and raisins. The major six general …

[HTML][HTML] Multi-objective Sand Piper Optimization Based Clustering with Multihop Routing Technique for IoT Assisted WSN

VK Kalimuthu, B Srinivasan - Brazilian Archives of Biology and …, 2023 - SciELO Brasil
Abstract Internet of Things (IoT) can be considered as one of the emergent research topics,
which linked several sensor enabled devices. Wireless sensor networks (WSNs) remains a …

Blockchain Assisted Fireworks Optimization with Machine Learning based Intrusion Detection System (IDS)

S Thiruvenkatasamy, R Sivaraj, M Vijayakumar - Tehnički vjesnik, 2024 - hrcak.srce.hr
Sažetak In order to cope with the growing complexity of cyber attacks, it is imperative to have
efficient intrusion detection systems (IDSs) that can monitor computer resources and …

A Multi-layer Guidance Approach for Submerged Sensor Networks Integrating Acoustic and Optical Technologies

R Krishnan, A Muniyandi, VK Kalimuthu… - Tehnički …, 2024 - hrcak.srce.hr
Sažetak Over the previous decade, there has been a significant focus on researching
underwater acoustic sensor networks (UW-ASNs) for a diverse range of underwater …

Deployment with Location Knowledge by Multi Area Approach for Detecting Replica Nodes in Wireless Sensor Network

SS Jacob, B Karthikeyan, T Johnpeter, R Jayamala - Tehnički vjesnik, 2024 - hrcak.srce.hr
Sažetak The Wireless Sensor Network (WSN) is important for the safety of network security.
Numerous scholars have documented fundamentally fundamental attacks of various kinds in …

Illegal Intrusion Detection of Internet of Things Based on Deep Mining Algorithm.

FAN Xingjuan, LI Hui, LIU Xinglong… - Tehnicki vjesnik …, 2023 - search.ebscohost.com
In this study, to reduce the influence of The Internet of Things (IoT) illegal intrusion on the
transmission effect, and ensure IoT safe operation, an illegal intrusion detection method of …

Illegal Intrusion Detection of Internet of Things Based on Deep Mining Algorithm

X Fan, H Li, X Liu, F Guo, H Ma - Tehnički vjesnik, 2023 - hrcak.srce.hr
Sažetak In this study, to reduce the influence of The Internet of Things (IoT) illegal intrusion
on the transmission effect, and ensure IoT safe operation, an illegal intrusion detection …

QoS Aware Data Congestion Control Routing in Mobile Ad Hoc Networks for Intelligent Transportations Systems

K Muthulakshmi, K Kalirajan, J Jean Justus… - Tehnički …, 2024 - hrcak.srce.hr
Sažetak The cooperative QoS Aware Based Data Congestion Control (QoS-ADCC)
algorithm is proposed to achieve this goal. It leverages QoS indicators such as connection …