Strategies based on various aspects of clustering in wireless sensor networks using classical, optimization and machine learning techniques: Review, taxonomy …

J Amutha, S Sharma, SK Sharma - Computer Science Review, 2021 - Elsevier
Abstract Wireless Sensor Networks (WSNs) have attracted various academic researchers,
engineers, science, and technology communities. This attraction is due to their broad …

An energy efficient cluster based hybrid optimization algorithm with static sink and mobile sink node for Wireless Sensor Networks

J Amutha, S Sharma, SK Sharma - Expert Systems with Applications, 2022 - Elsevier
In wireless sensor networks (WSNs), energy efficiency is a significant design challenge that
can be resolved by clustering and routing approaches. They are considered as Non …

A deep learning approach to predict the number of k-barriers for intrusion detection over a circular region using wireless sensor networks

A Singh, J Amutha, J Nagar, S Sharma - Expert Systems with Applications, 2023 - Elsevier
Abstract Wireless Sensor Networks (WSNs) is a promising technology with enormous
applications in almost every walk of life. One of the crucial applications of WSNs is intrusion …

An energy-aware hybrid approach for wireless sensor networks using re-clustering-based multi-hop routing

A Rezaeipanah, P Amiri, H Nazari, M Mojarad… - Wireless Personal …, 2021 - Springer
Wireless sensor networks (WSNs) consist of a large number of sensor nodes, which are
primarily employed for collecting data from an environment of interest. Energy resources of …

LT-FS-ID: Log-Transformed Feature Learning and Feature-Scaling-Based Machine Learning Algorithms to Predict the k-Barriers for Intrusion Detection Using …

A Singh, J Amutha, J Nagar, S Sharma, CC Lee - Sensors, 2022 - mdpi.com
The dramatic increase in the computational facilities integrated with the explainable
machine learning algorithms allows us to do fast intrusion detection and prevention at …

Intrusion detection system in wireless sensor network using conditional generative adversarial network

T Sood, S Prakash, S Sharma, A Singh… - Wireless Personal …, 2022 - Springer
Wireless communication networks have much data to sense, process, and transmit. It tends
to develop a security mechanism to care for these needs for such modern-day systems. An …

P2CA-GAM-ID: Coupling of probabilistic principal components analysis with generalised additive model to predict the k− barriers for intrusion detection

A Singh, J Nagar, J Amutha, S Sharma - Engineering Applications of …, 2023 - Elsevier
Drastic advancement in computing technology and the dramatic increase in the usage of
explainable machine learning algorithms provide a promising platform for developing robust …

A machine learning approach to predict the k-coverage probability of wireless multihop networks considering boundary and shadowing effects

J Nagar, SK Chaturvedi, S Soh, A Singh - Expert Systems with Applications, 2023 - Elsevier
Network coverage is a pivotal performance metric of wireless multihop networks (WMNs)
determining the quality of service rendered by the network. Earlier, a few studies have …

F-TLBO-ID: Fuzzy fed teaching learning based optimisation algorithm to predict the number of k-barriers for intrusion detection

A Singh, SMH Mousavi, J Nagar - Applied Soft Computing, 2024 - Elsevier
Ensuring fast and efficient Intrusion Detection and Prevention (IDP) at international borders
is crucial for maintaining security and safeguarding nations. In this study, we propose an …

Angle based critical nodes detection (ABCND) for reliable industrial wireless sensor networks

S Shukla - Wireless Personal Communications, 2023 - Springer
Node failure in the Wireless Sensor Networks (WSN) topology may lead to economic loss,
endanger people, and cause environmental damage. Node reliability can be achieved by …