[HTML][HTML] Recent advances in use of bio-inspired jellyfish search algorithm for solving optimization problems

JS Chou, A Molla - Scientific Reports, 2022 - nature.com
The complexity of engineering optimization problems is increasing. Classical gradient-
based optimization algorithms are a mathematical means of solving complex problems …

[HTML][HTML] Blockchain security enhancement: an approach towards hybrid consensus algorithms and machine learning techniques

K Venkatesan, SB Rahayu - Scientific Reports, 2024 - nature.com
In this paper, we propose hybrid consensus algorithms that combine machine learning (ML)
techniques to address the challenges and vulnerabilities in blockchain networks …

An improved high performance clustering based routing protocol for wireless sensor networks in IoT

MK Roberts, P Ramasamy - Telecommunication Systems, 2023 - Springer
Abstract The Internet of Things encompasses applications such as ecological, medicinal,
and defense surveillance that need real-time data collecting and standardization. Wireless …

An optimized ticket manager based energy‐aware multipath routing protocol design for IoT based wireless sensor networks

MK Roberts, J Thangavel - Concurrency and Computation …, 2022 - Wiley Online Library
Recently, wireless sensor networks (WSNs) and Internet of Things (IoTs) have emanated as
an indispensable assets that play a critical role in revolutionizing the field of data …

Block chain based trusted distributed routing scheme using optimized dropout ensemble extreme learning neural network in MANET

V Krishnakumar, R Asokan - Peer-to-Peer Networking and Applications, 2023 - Springer
Mobile ad hoc network (MANET) is a set of mobile nodes that communicate via wireless
networks while moving from one place to another. Numerous studies have been done on …

[HTML][HTML] A Novel Blockchain Approach for Improving the Security and Reliability of Wireless Sensor Networks Using Jellyfish Search Optimizer

VL Vinya, Y Anuradha, HR Karimi, PB Divakarachari… - Electronics, 2022 - mdpi.com
For the past few years, centralized decision-making is being used for malicious node
identification in wireless sensor networks (WSNs). Generally, WSN is the primary technology …

IoT Based Fire Protection System

DD Kumar, B Bharathraj, VN Vishak… - 2023 4th …, 2023 - ieeexplore.ieee.org
This work introduces a fire Management system to track different kinds of fire attacks across
industries. While traditional research mostly focuses on creating fire sensing. Fire alarm …

Extreme learning machine optimized by artificial cell swarm optimization for the data fusion modal in WSNs

S Govindaraj, L Raja, S Velmurugan… - Peer-to-Peer Networking …, 2024 - Springer
Abstract Wireless Sensor Networks (WSNs) have gained substantial prominence in various
applications, like healthcare, and surveillance due to its data gathering ability. Effective data …

The measurement and monitoring of Quality of service based on security analysis in wireless sensor network using deep learning architecture

S Qamar - Measurement, 2023 - Elsevier
Wireless sensor networks comprise of unattended little sensor hubs having low energy and
low scope of correspondence. Machine learning has demonstrated its effectiveness in …

Block chain technology for secured dynamic optimal routing in WSN with optimized generative adversarial capsule network

CA Bhuvaneswari, EDK Ruby - International Journal of …, 2024 - Wiley Online Library
One of the key strategies in wireless sensor network (WSN) for sending data packets to the
base station (BC) is known as routing. However, malicious node outbreaks will occur, which …