Study on the wireless sensor networks routing for Low-Power FPGA hardware in field applications

N Gupta, A Kumar - Computers and Electronics in Agriculture, 2023 - Elsevier
Very intelligent compact sensors with low-power and inexpensive solutions have been
created because of the industrial revolution and subsequent advancements in electrical …

[PDF][PDF] A study on intrusion detection system in wireless sensor networks

S Godala, RPV Vaddella - International Journal of Communication …, 2020 - researchgate.net
The technology of Wireless Sensor Networks (WSNs) has become most significant in
present day. WSNs are extensively used in applications like military, industry, health, smart …

A game theory based framework for materialized view selection in data warehouses

H Azgomi, MK Sohrabi - Engineering Applications of Artificial Intelligence, 2018 - Elsevier
Abstract Data warehouses exploit On-Line Analytical Processing (OLAP) to make rapid
answers for analytical queries. Huge amount of aggregated data within a data warehouse …

Using knowledge graphs and reinforcement learning for malware analysis

A Piplai, P Ranade, A Kotal, S Mittal… - … Conference on Big …, 2020 - ieeexplore.ieee.org
Machine learning algorithms used to detect attacks are limited by the fact that they cannot
incorporate the back-ground knowledge that an analyst has. This limits their suitability in …

OW‐SVM: Ontology and whale optimization‐based support vector machine for privacy‐preserved medical data classification in cloud

NP Karlekar, N Gomathi - International Journal of …, 2018 - Wiley Online Library
Cloud is a multitenant architecture that allows the cloud users to share the resources via
servers and is used in various applications, including data classification. Data classification …

Fuzzy logic and fog based secure architecture for internet of things (flfsiot)

SR Zahra, MA Chishti - Journal of ambient intelligence and humanized …, 2023 - Springer
Motivated by the recent explosion of interest around the Internet of Things (IoT), this paper is
focused on the dynamics of its security. It is a fact that at present, there is a dearth of …

The Choquet integral-based Shapley function for n-person cooperative games with probabilistic hesitant fuzzy coalitions

J Lin, Z Xu, Y Huang, R Chen - Expert Systems with Applications, 2023 - Elsevier
The use of probabilistic hesitant fuzzy elements (PHFEs) to represent the alliance status in
cooperative games can describe the player's participation levels and associated probability …

Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks

H Fang, L Xu, KKR Choo - Applied Mathematics and Computation, 2017 - Elsevier
In cognitive radio networks, physical layer security is a promising secure wireless
communication solution against eavesdropping attacks. In this paper, we study the problems …

A review paper on implementing reinforcement learning technique in optimising games performance

MA Samsuden, NM Diah… - 2019 IEEE 9th …, 2019 - ieeexplore.ieee.org
Reinforcement learning is one of the sub of machine learning. A machine learning agent
learns from the feedback of the try-and-error in order to predict their next step. Machine …

Application of fuzzy Q-learning for electricity market modeling by considering renewable power penetration

MR Salehizadeh, S Soltaniyan - Renewable and Sustainable Energy …, 2016 - Elsevier
By increasing renewable resource penetration, the need for developing fast and reliable
market modeling approaches in the presence of these resources has gained greater …