Attribute granules-based object entropy for outlier detection in nominal data

C Liu, D Peng, H Chen, Z Yuan - Engineering Applications of Artificial …, 2024 - Elsevier
Abstract Concept lattice theory, which is one of the key mathematical models of granular
computing, is capable of successfully dealing with uncertain information in nominal data. It …

RC-LAHR: Road-Side-Unit-Assisted Cloud-Based Location-Aware Hybrid Routing for Software-Defined Vehicular Ad Hoc Networks

M Kumar, RS Raw - Sensors, 2024 - mdpi.com
The reliability of the communication link is quite common and challenging to handle as the
topology changes frequently in vehicular ad hoc networks (VANETs). Another problem with …

Trust-based clustering and routing in WSNs using DST-WOA

S Singh, V Anand, S Yadav - Peer-to-Peer Networking and Applications, 2024 - Springer
Wireless sensor networks (WSNs) are increasingly being used in a variety of applications,
such as smart healthcare systems and the Internet of Things (IoT). Trust in WSNs is the …

Intrusion detection via optimal tuned LSTM model with trust and risk level evaluation

RB Kagade, N Vijayaraj - International Journal of Bio …, 2024 - inderscienceonline.com
Different heterogeneous wireless sensor networks (WSNs) linked with the cloud platform
make up a sensor cloud framework. The optimal cluster head (CH) is chosen from among …

IDA: Improved dragonfly algorithm for load balanced cluster heads selection in wireless sensor networks

A Srivastava, PK Mishra - Peer-to-Peer Networking and Applications, 2024 - Springer
Abstract Efficient Energy Consumption and Network Lifetime are significant concerns in
wireless sensor networks and allied disciplines. Clustering is one of the available solutions …

A hybrid heuristic-assisted deep learning for secured routing and malicious node detection in wireless sensor networks

D Kalpana, P Ajitha - Peer-to-Peer Networking and Applications, 2024 - Springer
Diverse routing and security protocols are implemented to enhance the efficacy when
performing the packet transmission, however, finding the optimal path is highly challenging …

Reactive handover coordination system with regenerative blockchain principles for swarm unmanned aerial vehicles

S Rajasoundaran, SVNS Kumar, M Selvi… - Peer-to-Peer Networking …, 2024 - Springer
Aerial warfare systems in various countries highly expect Swarm Unmanned Aerial Vehicles
(UAVs) and Flying Adhoc Networks (FANETs) for defense stability. However, swarm UAVs …

OCCOA for clustering-based intrusion detection system with MLP-RNN architecture

RB Kagade, N Vijayaraj - Multimedia Tools and Applications, 2024 - Springer
WSN play a critical role in various applications such as environmental monitoring,
surveillance, and healthcare. However, their deployment in open and dynamic environments …

[HTML][HTML] Enhancing wireless sensor network security and efficiency with CNN-FL and NGO optimization

M Shanmathi, A Sonker, Z Hussain, M Ashraf… - Measurement …, 2024 - Elsevier
In this study, we discuss how Wireless Sensor Networks (WSN) are susceptible to malicious
assaults from malfunctioning nodes, which jeopardise the security of data transmission in …

基于Q-Learning 的分簇无线传感网信任管理机制

赵远亮, 王涛, 李平, 吴雅婷, 孙彦赞… - 上海大学学报(自然科学 …, 2024 - journal.shu.edu.cn
针对无线传感器网络中存在的安全问题, 提出了基于Q-Learning 的分簇无线传感网信任管理
机制(Q-learning based trust management mechanism for clustered wireless sensor …