[PDF][PDF] Selection of machine learning techniques for network lifetime parameters and synchronization issues in wireless networks

N Srilakshmi, AK Sangaiah - Journal of Information Processing …, 2019 - koreascience.kr
In real time applications, due to their effective cost and small size, wireless networks play an
important role in receiving particular data and transmitting it to a base station for analysis, a …

Computational intelligence techniques for energy efficient routing protocols in wireless sensor networks: A critique

MS Lakshmi, KS Ramana, G Ramu… - Transactions on …, 2024 - Wiley Online Library
Abstract Wireless Sensor Networks (WSNs) play a pivotal role in modern data acquisition
systems, but their energy‐efficient operation remains a significant challenge. This work …

RETRACTED ARTICLE: Support vector regression methodology for prediction of input displacement of adaptive compliant robotic gripper

D Petković, S Shamshirband, H Saboohi, TF Ang… - Applied …, 2014 - Springer
The prerequisite for new versatile grippers is the capability to locate and perceive protests in
their surroundings. It is realized that automated controllers are profoundly nonlinear …

A Multi-Agents Deep Reinforcement Learning Autonomous Security Management Approach for Internet of Things

B Ren, Y Tang, H Wang, Y Wang, J Liu… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Enhancing the security capability of decentralized networks has been a focus of attention in
the IoT academic community. Decentralized networks face problems such as lack of security …

PGSW-OS: a novel approach for resource management in a semantic web operating system based on a P2P grid architecture

S Javanmardi, M Shojafar, S Shariatmadari… - The journal of …, 2014 - Springer
A web operating system is an operating system that users can access from any hardware at
any location. A peer-to-peer (P2P) grid uses P2P communication for resource management …

Quantal Response Equilibrium‐Based Strategies for Intrusion Detection in WSNs

S Shen, K Hu, L Huang, H Li, R Han… - Mobile Information …, 2015 - Wiley Online Library
This paper is to solve the problem stating that applying Intrusion Detection System (IDS) to
guarantee security of Wireless Sensor Networks (WSNs) is computationally costly for sensor …

Evaluating intrusion prevention systems with evasions

M Särelä, T Kyöstilä, T Kiravuo… - International Journal of …, 2017 - Wiley Online Library
Intrusion prevention systems have become a common security measure in the past 20 years.
Their promise is the possibility to prevent known attacks against vulnerable, unpatched …

An Intelligent Reinforcement Learning–Based Method for Threat Detection in Mobile Edge Networks

MY Saeed, J He, N Zhu, M Farhan… - … Journal of Network …, 2024 - Wiley Online Library
Traditional techniques for detecting threats in mobile edge networks are limited in their
ability to adapt to evolving threats. We propose an intelligent reinforcement learning (RL) …

A comprehensive survey on community detection methods and applications in complex information networks

A Diboune, H Slimani, H Nacer… - Social Network Analysis …, 2024 - Springer
This paper extensively reviews the literature of community detection in complex networks
and proposes a general classification describing the main models used for this purpose …

Fuzzy approach on modelling cyber attacks patterns on data transfer in industrial control systems

E Pricop, SF Mihalache - 2015 7th International Conference on …, 2015 - ieeexplore.ieee.org
Cybersecurity of industrial control system is a very complex and challenging research topic,
due to the integration of these systems in national critical infrastructures. The control systems …