An enhanced energy-efficient fuzzy-based cognitive radio scheme for IoT

P Chithaluru, T Stephan, M Kumar, A Nayyar - Neural Computing and …, 2022 - Springer
Energy is a critical factor to be considered in electrical and electronic systems. With the
advent of technology, numerous techniques have been developed in communication …

Energy-balanced neuro-fuzzy dynamic clustering scheme for green & sustainable IoT based smart cities

P Chithaluru, F Al-Turjman, M Kumar… - Sustainable Cities and …, 2023 - Elsevier
Abstract The Internet of Things (IoT) is a pervasive computing technology that provides
solutions to critical sustainable smart city applications. Each sustainable application has its …

[PDF][PDF] An enhanced self-learning-based clustering scheme for real-time traffic data distribution in wireless networks

A Jain, T Mehrotra, A Sisodia, S Vishnoi, S Upadhyay… - Heliyon, 2023 - cell.com
The process of examining the data flow over the internet to identify abnormalities in wireless
network performance is known as network traffic analysis. When analyzing network traffic …

Computational-intelligence-inspired adaptive opportunistic clustering approach for industrial IoT networks

P Chithaluru, F Al-Turjman, M Kumar… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
The major issues and challenges of the Industrial Internet of Things (IIoT) include network
resource management, self-organization; routing, mobility, scalability, security, and data …

An Optimized Bio-inspired Localization Routing Technique for Sustainable IIoT Networks & Green Cities

P Chithaluru, F Al-Turjman, T Stephan, M Kumar… - Sustainable Cities and …, 2023 - Elsevier
Abstract The industrial Internet of Things (IIoTs) network life is shortened due to sensor node
(SN) energy limitations and computational capability. As a result, optimum node location …

An authentication protocol for next generation of constrained Iot systems

S Rostampour, N Bagheri, Y Bendavid… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
With the exponential growth of connected Internet of Things (IoT) devices around the world,
security protection and privacy preservation have risen to the forefront of design and …

Traffic anomaly detection in wireless sensor networks based on principal component analysis and deep convolution neural network

C Yao, Y Yang, K Yin, J Yang - IEEE Access, 2022 - ieeexplore.ieee.org
With the popularity of wireless networks, wireless sensor networks (WSNs) have advanced
rapidly, and their flexibility and ease of deployment have resulted in more security concerns …

MIFNet: A lightweight multiscale information fusion network

J Cheng, X Peng, X Tang, W Tu… - International Journal of …, 2022 - Wiley Online Library
Semantic segmentation technique plays a crucial role in Internet of Things applications,
such as industrial robotics and self‐driving. Recently deep learning approaches have …

An optimized intelligent computational security model for interconnected blockchain-IoT system & cities

S Kumar, A Singh, A Benslimane, P Chithaluru… - Ad Hoc Networks, 2023 - Elsevier
Blockchain technology may provide a potential solution to the Internet of Things (IoT)
security challenges by providing a decentralized and secure method for storing, managing …

An enhanced hybrid glowworm swarm optimization algorithm for traffic-aware vehicular networks

P Upadhyay, V Marriboina, S Kumar, S Kumar… - IEEE …, 2022 - ieeexplore.ieee.org
A subclass of a Mobile Adhoc Network (MANET) is a Vehicular Adhoc Network (VANET). It
consists of self-configuring moving vehicles which are called nodes. It is an inevitable …