A new algorithm of clustering AODV based on edge computing strategy in IOV

D Zhang, C Gong, T Zhang, J Zhang, M Piao - Wireless Networks, 2021 - Springer
In the vehicular ad hoc network (VANET), due to the particularity of high-speed movement of
vehicle nodes, there are higher challenges in link stability and network topology control …

Iot and data mining techniques to detect and regulating of solar power system

KSR Kumar, RR Solanke, G Laxmaiah… - 2023 International …, 2023 - ieeexplore.ieee.org
As a result of its practical and long-term benefits, renewable energy sources are the subject
of intensive study. For instance, solar power stations are among the renewable energy …

LPG Cylinder Leakage Monitoring by IoT

KS Chakradhar, R Deshmukh, PP Singh… - 2023 International …, 2023 - ieeexplore.ieee.org
This study aims to set up a system that will watch for leaks of liquid petroleum gas in both
homes and businesses. This data will update through IoT connectivity to the user's web …

Deep optimization algorithm for emergency-aware data transmission in Mobile-Ad Hoc Networks

A Baskar, A Rajaram - Journal of Intelligent & Fuzzy Systems, 2023 - content.iospress.com
Abstract Mobile Adhoc Network (MANET) is a dynamic network with mobility nodes.
Emerging applications for MANETs in real-time present numerous research challenges …

Optimizing secure routing for mobile ad-hoc and WSN in IoT through dynamic adaption and energy efficiency

JV Gripsy, A Jayanthiladevi - … Sensor Networks and the Internet of …, 2024 - taylorfrancis.com
Mobile ad-hoc networks (MANET) have a variety of characteristics that set them apart from
other networks. MANET presents a substantial problem in the deployment of a routing …

An Efficient Routing Mechanism for IOT Using Deep Learning

P Maurya, S Devi, RK Yadav, M Saran… - Computer Integrated …, 2023 - cims-journal.net
Combining WLAN with ad hoc networks, Vehicular Ad hoc Networks (VANETs) are a new
and exciting area of study. VANETs consist of many different entities that must coordinate …

IoT based Data Protection Technique for Security and Privacy Preserving in Cloud ERP

E Sabbarwal, DS Pandey - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
The use of cloud computing is a fundamental technology that enables the sharing of
resources over the internet. The preservation of data confidentiality during storage is a …

Hybrid DES-RSA Model for the Security of Data over Cloud Storage

RK Yadav, M Saran, P Maurya, S Devi… - Computer Integrated …, 2023 - cims-journal.net
Cloud computing is a novel business strategy. Over the past several years, the idea of cloud
computing has matured, becoming one of the most rapidly expanding business concepts in …

Underwater Acoustic Network Protocol based on Directed Graph: A self-organization method of underwater acoustic network with asymmetric communication links

D Xiao, M Zhao, N Jia, L Wei, Y Chen… - Proceedings of the 15th …, 2021 - dl.acm.org
In an underwater acoustic network, the position of each underwater node is relatively fixed
after it is deployed. Commonly, it is not easy to obtain auxiliary information before the …

[引用][C] A New Survey on Recent Methods in Agriculture Using IOT

J Patel, J Dwivedi, A Saxena, V Rawat - Industrial Engineering Journal, 2022