Secure opportunistic watchdog production in wireless sensor networks: a review

S Rajasoundaran, AV Prabu, GS Kumar… - Wireless Personal …, 2021 - Springer
Finding the security vulnerabilities and solving the issues in Wireless Sensor Networks
(WSN) are mandatory tasks for providing secure data transmission. Attackers or intruders …

Analysis and prediction of diabetes using machine learning

S Saru, S Subashree - International journal of emerging technology …, 2019 - papers.ssrn.com
Healthcare industry contains very large and sensitive data and needs to be handled very
carefully. Diabetes Mellitus is one of the growing extremely fatal diseases all over the world …

Black hole attack prevention in mobile ad-hoc network (MANET) using ant colony optimization technique

DM Khan, T Aslam, N Akhtar, S Qadri… - … Technology and Control, 2020 - itc.ktu.lt
The Mobile ad-hoc networks are auto configured systems where hubs can travel towards
any direction. It doesn't rely on any other frame to build the framework. Because of its …

[PDF][PDF] Churn prediction in Telecom using classification algorithms

G ApurvaSree, S Ashika, S Karthi… - International Journal of …, 2019 - academia.edu
Customershaveawiderangeoftelecomservic… industryandswitchingfromoneservicetoother…
[2], increasedcustomerchurnisalwaysamajorco… today [3]. Theaccuracyratealsomakesustoknowaboutt …

Intelligent detection of untrusted data transmission to optimize energy in sensor networks

D Yuvaraj, M Sivaram… - Journal of Information …, 2020 - Taylor & Francis
Nowadays environmental conditions are monitored using distributed sensors that react to
the environment conditions and send the collected data over wireless channels. Every …

[图书][B] An eeg based emotion recognition and classification using machine learning techniques

Akalya devi C, Dr. Karthika Renuka D, S Soundarya - 2019 - researchgate.net
Emotions are complex phenomena that play significant roles in the quality of human life.
Emotion plays a major role in motivation, perception, cognition, creativity, attention, learning …

High capacity and optimized image steganography technique based on ant colony optimization algorithm

A Priya - International Journal of Emerging Technology and …, 2018 - papers.ssrn.com
The tremendous development of digital technology, it is mandatory to address the security
while transmitting information over network in a way that observer couldn't depict it …

Оптимізація пропускних здатностей каналів зв'язку гіперконвергентної системи

N Kuchuk, N Lukova-Chuiko… - … управління, навігації та …, 2019 - journals.nupp.edu.ua
Анотація Завдання оптимізації пропускних здатностей каналів зв'язку
гіперконвергентної системи потребує застосування сучасних математичних і …

[PDF][PDF] Application of weighted product method for determining home renovation assistance in Pringsewu district

M Muslihudin, B Ayshwarya, DY Effendi… - International Journal of …, 2019 - academia.edu
House is a place that is needed by human beside clothing and food. House has important
function for all people, a place to unwind and gather with family. A good and comfortable …

Black/Gray Holes Detection Tools in MANET: comparison and analysis

MS Abood, HF Mahdi, MM Hamdi… - 2020 IEEE 7th …, 2020 - ieeexplore.ieee.org
A wide community of sensor nodes is subscribing to the Mobile AdHoc network (MANET)
and has self-directed commands. Individual nodes within the network can escort or without …