K Murphy, A Lavignotte, C Lepers - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Recently Network Fault Prediction (NFP) has arisen new scientific interest. The ability to predict network equipment failure is increasingly identified as an effective tool to improve …
The main challenges in routing protocols are node mobility, resource constraints, error- prone channel states, and problems with hidden and unprotected terminals. This article …
Classification is a widely used supervised learning technique that enables models to discover the relationship between a set of features and a specified label using available …
S Singh, V Anand, PK Bera - International Journal of Cognitive Computing …, 2023 - Elsevier
Energy efficiency is an existing research challenge in wireless sensor networks (WSNs); to make WSNs energy efficient, many researchers moved to low-duty cycle WSNs with different …
D Kulkarni, M Venkatesan… - 2023 Third International …, 2023 - ieeexplore.ieee.org
In modern communication systems there are heterogeneous service request from the applications like mobile devices, virtual reality, automatic driving cars, IoT devices. These …
Z Guo, J Sun, J Fu, L Yuan, S Zhuang… - ICASSP 2024-2024 …, 2024 - ieeexplore.ieee.org
The ever-increasing complexity and scale of 5G communication networks pose huge challenges to network operations. Root cause analysis is considered as a promising method …
S Kahkeshan, Z Homavazir - 2023 IEEE 4th Annual Flagship …, 2023 - ieeexplore.ieee.org
Error detection and correction are critical components of any wireless digital communication system. In wireless digital communication, an error detection and correction method is used …
CS Kumar, NS Rao… - MATEC Web of …, 2024 - matec-conferences.org
MANETs, infrastructure-free, multi-hop networks with an in height grade of complexity and dispersed nodes. Without a permanent and dedicated infrastructure, a node can …
RR Nuiaa, AH Alsaeedi, SS Alkafagi… - Wasit Journal of …, 2022 - academia.edu
The main challenges in routing protocols are node mobility, resource constraints, error- prone channel states, and problems with hidden and unprotected terminals. This article …