Deep learning, machine learning and internet of things in geophysical engineering applications: An overview

K Dimililer, H Dindar, F Al-Turjman - Microprocessors and Microsystems, 2021 - Elsevier
Abstract The earthquakes in Eastern Mediterranean are mostly tectonic. The earthquakes
that are 60 km deep in the ground are called Shallow earthquakes. The earthquakes in the …

A Fuzzy Trust Evaluation of Cloud Collaboration Outlier Detection in Wireless Sensor Networks.

R Sabitha, AP Shukla, A Mehbodniya… - Adhoc & Sensor …, 2022 - search.ebscohost.com
One of the primary challenges in Wireless Sensor Networks (WSNs) is security. This
research proposes an efficient fuzzy trust evaluation of cloud collaboration outlier detection …

A secure clustering protocol with fuzzy trust evaluation and outlier detection for industrial wireless sensor networks

L Yang, Y Lu, SX Yang, T Guo… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Security is one of the major concerns in industrial wireless sensor networks (IWSNs). To
assure the security in clustered IWSNs, this article presents a secure clustering protocol with …

[HTML][HTML] Design and implementation of a multi-hop real-time LoRa protocol for dynamic LoRa networks

HP Tran, WS Jung, DS Yoo, H Oh - Sensors, 2022 - mdpi.com
Recently, LoRa (Long Range) technology has been drawing attention in various
applications due to its long communication range and high link reliability. However, in …

A real-time LoRa protocol for industrial monitoring and control systems

QL Hoang, WS Jung, T Yoon, D Yoo, H Oh - IEEE Access, 2020 - ieeexplore.ieee.org
LoRa technology draws attention for its use in industrial monitoring and control systems in
which each end device or task is required to send data periodically to a (cloud) server …

A dynamic behavior monitoring game-based trust evaluation scheme for clustering in wireless sensor networks

L Yang, Y Lu, S Liu, T Guo, Z Liang - IEEE Access, 2018 - ieeexplore.ieee.org
A typical wireless sensor network (WSN) is often deployed in harsh or hostile environment to
work in an unattended mode. It is prone to various attacks during routing process as the …

[HTML][HTML] Trust evaluation model with entropy-based weight assignment for malicious node's detection in wireless sensor networks

X Yin, S Li - EURASIP Journal on Wireless Communications and …, 2019 - Springer
Trust management is considered as an effective complementary mechanism to ensure the
security of sensor networks. Based on historical behavior, the trust value can be evaluated …

SCSMA: A smart CSMA/CA using blind learning for wireless sensor networks

TT Nguyen, H Oh - IEEE Transactions on Industrial Electronics, 2019 - ieeexplore.ieee.org
A smart carrier sense multiple access (SCSMA) using control messages is proposed for low
power and low bandwidth wireless sensor networks (WSNs). In traditional WSNs, the use of …

Modeling and simulation of secure connectivity and hop count of multi-hop ad-hoc wireless networks with colluding and non-colluding eavesdroppers

T Kim - Ad Hoc Networks, 2021 - Elsevier
Connectivity and hop count are two crucial attributes of dynamic wireless networks such as
ad-hoc wireless networks (AHWNs). When the security issue is considered, establishing a …

A smart multichannel slotted sense multiple access protocol for industrial wireless sensor networks

TT Nguyen, H Oh - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) can be used for monitoring and control applications in
which a server collects data from a work field and provides a service based on the analysis …