A literature study on machine learning fusion with IOT

K Sharma, R Nandal - … on Trends in Electronics and Informatics …, 2019 - ieeexplore.ieee.org
In the present era of rapidly growing mature technologies and their inter-connection with
hardware devices and software applications plays a vital role for the emergence of different …

Methodology, applications, and challenges of WSN-IoT

R Sharma, S Prakash, P Roy - 2020 international conference on …, 2020 - ieeexplore.ieee.org
Wireless Sensor Network (WSN) is the trending area in Internet of Things (IoT)
communication technology (WSN-IoT). The researchers have done a lot of contributions to …

A reliable energy efficient dynamic spectrum sensing for cognitive radio IoT networks

JA Ansere, G Han, H Wang, C Choi… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) that allows connectivity of network devices embedded with
sensors undergoes severe data exchange interference as the unlicensed spectrum band …

The security and privacy of mobile edge computing: An artificial intelligence perspective

C Wang, Z Yuan, P Zhou, Z Xu, R Li… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Mobile-edge computing (MEC) is a new computing paradigm that enables cloud computing
and information technology (IT) services to be delivered at the network's edge. By shifting …

Characteristics of co-allocated online services and batch jobs in internet data centers: a case study from Alibaba cloud

C Jiang, G Han, J Lin, G Jia, W Shi, J Wan - IEEE Access, 2019 - ieeexplore.ieee.org
In order to reduce power and energy costs, giant cloud providers now mix online and batch
jobs on the same cluster. Although the co-allocation of such jobs improves machine …

A BP neural network prediction model based on dynamic cuckoo search optimization algorithm for industrial equipment fault prediction

W Zhang, G Han, J Wang, Y Liu - IEEE Access, 2019 - ieeexplore.ieee.org
The fault prediction problem for modern industrial equipment is a hot topic in current
research. So, this paper first proposes a dynamic cuckoo search algorithm. The algorithm …

A two-stage location-sensitive and user preference-aware recommendation system

N Mohammadi, A Rasoolzadegan - Expert Systems with Applications, 2022 - Elsevier
Nowadays, cloud customers use cloud services increasingly to satisfy their demands.
Usually, a significant number of customers are immature and inexpert and cannot express …

Utility-efficient differentially private K-means clustering based on cluster merging

T Ni, M Qiao, Z Chen, S Zhang, H Zhong - Neurocomputing, 2021 - Elsevier
Differential privacy is widely used in data analysis. State-of-the-art k-means clustering
algorithms with differential privacy typically add an equal amount of noise to centroids for …

A probabilistic source location privacy protection scheme in wireless sensor networks

H Wang, G Han, W Zhang, M Guizani… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
With the recent developments of wireless sensor networks (WSNs), computing and
communication have experienced huge advancement. Meanwhile, security has not received …

Highly secured cluster based WSN using novel FCM and enhanced ECC-ElGamal encryption in IoT

AS Reegan, V Kabila - Wireless Personal Communications, 2021 - Springer
The wireless sensor networks WSN is the most substantial network utilized in the IoT based
applications. The WSN consists of various sensor nodes used for the data transmission. The …