Adjacent node based energetic association factor routing protocol in wireless sensor networks

CC Vignesh, CB Sivaparthipan, JA Daniel… - Wireless Personal …, 2021 - Springer
Currently, the mobile ad hoc networks are experiencing quicker progression since due to
their minimal cost, variance and unfussiness of the autonomous devices. These devices …

Optimal path selection using reinforcement learning based ant colony optimization algorithm in IoT-Based wireless sensor networks with 5G technology

GP Dubey, S Stalin, O Alqahtani, A Alasiry… - Computer …, 2023 - Elsevier
Abstract The Internet of Things (IoTs) expanded quickly, giving rise to numerous services,
apps, electronic devices with integrated sensors, and associated protocols, which are still …

Multi‐objective metaheuristic optimization‐based clustering with network slicing technique for Internet of Things‐enabled wireless sensor networks in 5G systems

BG Sheena, N Snehalatha - Transactions on Emerging …, 2023 - Wiley Online Library
Presently, 5G communication networks have become successful in achieving maximum data
rage, and different Internet of Things (IoT) and wireless sensor networks (WSN) have been …

Optimization of the operational state's routing for mobile wireless sensor networks

KK Almuzaini, S Joshi, S Ojo, M Aggarwal, P Suman… - Wireless …, 2023 - Springer
High levels of node power in Mobile Wireless Sensor Networks (MWSN) can have an effect
on the reliability of a number of different aspects of the service. Due to their inherently low …

Artificial intelligence framework‐based ultra‐lightweight communication protocol for prediction of attacks in Internet of Things environment

M Jammula, VM Vakamulla… - Transactions on …, 2023 - Wiley Online Library
Abstract The Internet of Things is an enhanced intelligent infrastructure that is created
through the use of a number of different devices that are capable of self‐organization. Data …

Novel multiple access protocols against Q-learning-based tunnel monitoring using flying ad hoc networks

BH Awaji, MM Kamruzzaman, A Althuniabt, I Aqeel… - Wireless …, 2024 - Springer
Some protocols operated in the MAC layer and the open-source interconnections model to
share the packet delivery and the network channel to deliver the packet is done …

Resisting bad mouth attack in vehicular platoon using node-centric weight-based trust management algorithm (NC-WTM)

R Priya, N Sivakumar - Connection Science, 2022 - Taylor & Francis
Individuals use Vehicular Ad Hoc Networks (VANETs) to secure, reliable communication
networks as a viable route of transmission. Platooning uses Inter-Vehicular Communication …

Research on network abnormal data flow mining based on improved cluster analysis

X Jia - Distributed and Parallel Databases, 2022 - Springer
Aiming at the problems of traditional methods that cannot adapt to the interference of noise
or abnormal data, the data mining time is long, and the data mining accuracy is low, a …

Novel energy consumption and reduces number of transmission attempts (ECRTA) model for heterogeneous wireless muti-hop network

VS Pandi, E Sivajothi, PR Therasa, RS Rajan - Wireless Networks, 2024 - Springer
Energy utilization is increasingly significant for heterogeneous wireless multi-hop systems.
Energy utilization models are progressively powerful in giving the usefulness of convention …

Deep hashing with multilayer CNN-based biometric authentication for identifying individuals in transportation security

SR Borra, B Premalatha, G Divya… - Journal of …, 2024 - Springer
One of the biggest challenges in transportation security systems is ensuring reliable and
effective identification of people. However, improved security in transportation systems was …