Interleaved Honeypot-Framing Model with Secure MAC Policies for Wireless Sensor Networks

R Soundararajan, M Rajagopal, A Muthuramalingam… - Sensors, 2022 - mdpi.com
The Wireless Medium Access Control (WMAC) protocol functions by handling various data
frames in order to forward them to neighbor sensor nodes. Under this circumstance, WMAC …

Pilot Compression Analysis for Feedback Based Channel Estimation Model in FDD Massive MIMO

M Jayaram, BM Anjaneyulu - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
Massive MIMO systems are being incorporated in 5G wireless networks owing to its high
spectral efficiency. In order to achieve this efficiency, we require accurate Channel State …

Echo state neural network-assisted mobility-aware seamless handoff in mobile WSNs

Q Dong, ZR Lai, M Lu - Ad Hoc Networks, 2022 - Elsevier
Abstract Strong mobility in Wireless Sensor Networks (WSNs) may disrupt an existing link
between two communicating nodes. Because many Medium Access Control (MAC) …

Investigation of COVID-19 symptoms using deep learning based image enhancement scheme for x-ray medical images

V Pandimurugan, AV Prabu… - International …, 2023 - inderscienceonline.com
Image enhancement is the inevitable technique for investigating various biological features.
The biological image data can be obtained from computer tomography (CT), magnetic …

VMRF: revolutionizing military border surveillance with extensive coverage and connectivity

SP Subotha, L Femila - Telecommunication Systems, 2024 - Springer
Nowadays, wireless sensor networks (WSNs) are utilised in military-based applications like
border surveillance. However, existing border surveillance methods have difficulties with …

Improved Adaptive Spiral Seagull Optimizer for Intrusion Detection and Mitigation in Wireless Sensor Network

S Darla, C Naveena - SN Computer Science, 2024 - Springer
A system that leverages blockchain technology to protect network data and provide tamper-
proof administration, privacy, and intrusion detection for sensor networks. This blockchain …

Block chain technology for secured dynamic optimal routing in WSN with optimized generative adversarial capsule network

CA Bhuvaneswari, EDK Ruby - International Journal of …, 2024 - Wiley Online Library
One of the key strategies in wireless sensor network (WSN) for sending data packets to the
base station (BC) is known as routing. However, malicious node outbreaks will occur, which …

[Retracted] The Path of Digital Government and University Asset Intelligence Value‐Added Service Driven by Block Chain Technology

Q Feng, R Mohd Ramli, Y Liu - Journal of Electrical and …, 2022 - Wiley Online Library
At present, the government and universities mainly adopted the centralized management
mode in the sharing of asset digital resources, which not only had low work efficiency, but …

An improved blockchain based encryption scheme for secure routing in wireless sensor network using machine learning technique

U Meena, P Sharma - Transactions on Emerging …, 2023 - Wiley Online Library
A secure routing scheme plays an integral role in ensuring the secure routing and efficiency
of wireless sensor networks (WSNs). Recently, many studies have been undertaken to …

[PDF][PDF] Efficient Time Sensitive Routing Protocol for Wireless Sensor Network

YKA Jabir - 2023 - uokerbala.edu.iq
I am heartily grateful to my supervisor, Dr. Haydar Abdulameer Marhoon, whose patient
encouragement, guidance and insightful criticism from the beginning to the final level …