Support vector regression methodology for wind turbine reaction torque prediction with power-split hydrostatic continuous variable transmission

S Shamshirband, D Petković, A Amini, NB Anuar… - Energy, 2014 - Elsevier
Nowadays the use of renewable energy including wind energy has risen dramatically.
Because of the increasing development of wind power production, improvement of the …

Network-centric performance analysis of runtime application migration in mobile cloud computing

E Ahmed, A Akhunzada, M Whaiduzzaman… - … Modelling Practice and …, 2015 - Elsevier
Mobile cloud computing alleviates the limitations of resource-constrained mobile devices by
leveraging the cloud resources. Currently, software-level solutions, also known as …

A genetic-based extreme gradient boosting model for detecting intrusions in wireless sensor networks

M Alqahtani, A Gumaei, H Mathkour… - Sensors, 2019 - mdpi.com
An Intrusion detection system is an essential security tool for protecting services and
infrastructures of wireless sensor networks from unseen and unpredictable attacks. Few …

D-FICCA: A density-based fuzzy imperialist competitive clustering algorithm for intrusion detection in wireless sensor networks

S Shamshirband, A Amini, NB Anuar, MLM Kiah… - Measurement, 2014 - Elsevier
Owing to the scattered nature of Denial-of-Service attacks, it is tremendously challenging to
detect such malicious behavior using traditional intrusion detection systems in Wireless …

Co-FAIS: cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks

S Shamshirband, NB Anuar, MLM Kiah… - Journal of Network and …, 2014 - Elsevier
Due to the distributed nature of Denial-of-Service attacks, it is tremendously challenging to
identify such malicious behavior using traditional intrusion detection systems in Wireless …

A distributed coverage hole recovery approach based on reinforcement learning for Wireless Sensor Networks

F Hajjej, M Hamdi, R Ejbali, M Zaied - Ad Hoc Networks, 2020 - Elsevier
Abstract In Wireless Sensor Networks (WSNs), various anomalies may arise and reduce
their reliability and efficiency. For example, Coverage Hole can occur in such networks due …

Unsupervised concrete feature selection based on mutual information for diagnosing faults and cyber-attacks in power systems

H Hassani, E Hallaji, R Razavi-Far, M Saif - Engineering Applications of …, 2021 - Elsevier
Removing the redundant features from massive data collected from power systems is of
paramount importance in improving the efficiency of data-driven diagnostic systems. This …

An effective classification for DoS attacks in wireless sensor networks

T Park, D Cho, H Kim - 2018 Tenth international conference …, 2018 - ieeexplore.ieee.org
Intrusion Detection Systems (IDSs) have an important role in detecting and preventing
security attacks. An IDS should be in Wireless Sensor Networks (WSN) to ensure the …

A nifty collaborative intrusion detection and prevention architecture for smart grid ecosystems

A Patel, H Alhussian, JM Pedersen, B Bounabat… - Computers & …, 2017 - Elsevier
Smart Grid (SG) systems are critical, intelligent infrastructure utility services connected
through open networks that are potentially susceptible to cyber-attacks with very acute …

Reduction of fuel consumption and exhaust pollutant using intelligent transport systems

MK Nasir, R Md Noor, MA Kalam… - The Scientific World …, 2014 - Wiley Online Library
Greenhouse gas emitted by the transport sector around the world is a serious issue of
concern. To minimize such emission the automobile engineers have been working …