Enhancing Internet of Medical Things security with artificial intelligence: A comprehensive review

S Messinis, N Temenos, NE Protonotarios… - Computers in Biology …, 2024 - Elsevier
Over the past five years, interest in the literature regarding the security of the Internet of
Medical Things (IoMT) has increased. Due to the enhanced interconnectedness of IoMT …

Localization and detection of multiple attacks in wireless sensor networks using artificial neural network

GG Gebremariam, J Panda… - … and Mobile Computing, 2023 - Wiley Online Library
Security enhancement in wireless sensor networks (WSNs) is significant in different
applications. The advancement of routing attack localization is a crucial security research …

[HTML][HTML] Hyperspectral image classification model using squeeze and excitation network with deep learning

T Rajendran, P Valsalan, J Amutharaj… - Computational …, 2022 - ncbi.nlm.nih.gov
In the domain of remote sensing, the classification of hyperspectral image (HSI) has become
a popular topic. In general, the complicated features of hyperspectral data cause the precise …

Design of advanced intrusion detection systems based on hybrid machine learning techniques in hierarchically wireless sensor networks

GG Gebremariam, J Panda, S Indu - Connection Science, 2023 - Taylor & Francis
Wireless sensor networks (WSNs) are an emerging military and civilian technology that uses
sensors. Sensor networks are hierarchical and chaotic in remote, unmonitored sites …

A bio-inspired approach: firefly algorithm for multi-depot vehicle routing problem with time windows

R Yesodha, T Amudha - Computer Communications, 2022 - Elsevier
In this research, an improved bio-inspired metaheuristic named firefly is utilized to solve the
Multi-Depot Vehicle Routing Problem with Time Windows (MDVRP-TW) and it is a …

[PDF][PDF] Content-Based Movie Recommendation System Using MBO with DBN.

S Sridhar, D Dhanasekaran… - Intelligent Automation & …, 2023 - researchgate.net
The content-based filtering technique has been used effectively in a variety of
Recommender Systems (RS). The user explicitly or implicitly provides data in the Content …

[PDF][PDF] Modelling Mobile-X Architecture for Offloading in Mobile Edge Computing.

G Pandiyan, E Sasikala - Intelligent Automation & Soft …, 2023 - cdn.techscience.cn
Mobile Edge Computing (MEC) assists clouds to handle enormous tasks from mobile
devices in close proximity. The edge servers are not allocated efficiently according to the …

[PDF][PDF] A Feature Learning-Based Model for Analyzing Students' Performance in Supportive Learning.

P Prabhu, P Valarmathie… - Intelligent Automation & …, 2023 - cdn.techscience.cn
Supportive learning plays a substantial role in providing a quality education system. The
evaluation of students' performance impacts their deeper insight into the subject knowledge …

[PDF][PDF] Malicious activities prediction over online social networking using ensemble model

S Sadhasivam, P Valarmathie… - Intelligent Automation & …, 2023 - cdn.techscience.cn
With the vast advancements in Information Technology, the emergence of Online Social
Networking (OSN) has also hit its peak and captured the attention of the young generation …

A lightweight hierarchical method for improving security in the internet of things using fuzzy logic

S Doostani, H Barati, A Barati - Concurrency and Computation …, 2024 - Wiley Online Library
The internet of things (IoT) refers to the interconnection of various devices through the
internet. With the help of IoT, different applications and devices can interact with each other …