[HTML][HTML] Single and multigeneration Rankine cycles with aspects of thermodynamical modeling, energy and exergy analyses and optimization: A key review along with …

A Tiktas, H Gunerhan, A Hepbasli - Energy Conversion and Management …, 2022 - Elsevier
The energy crises caused by the rapidly increasing population density around the world and
the economic, environmental and health threats, that have reached significant dimensions …

CryptoGA: a cryptosystem based on genetic algorithm for cloud data security

M Tahir, M Sardaraz, Z Mehmood, S Muhammad - Cluster Computing, 2021 - Springer
Cloud Computing is referred to as a set of hardware and software that are being combined
to deliver various services of computing. The cloud keeps the services for delivery of …

Design and development of an efficient network intrusion detection system using machine learning techniques

T Rincy N, R Gupta - Wireless Communications and Mobile …, 2021 - Wiley Online Library
Today's internets are made up of nearly half a million different networks. In any network
connection, identifying the attacks by their types is a difficult task as different attacks may …

Security algorithm of Internet of Things based on ZigBee protocol

Y Wang, C Chen, Q Jiang - Cluster Computing, 2019 - Springer
To study the application of ZigBee protocol in the security algorithm of Internet of Things, the
relevant development status at home and abroad is firstly summarized and ZigBee …

Feature optimization for run time analysis of malware in windows operating system using machine learning approach

A Irshad, R Maurya, MK Dutta… - … and Signal Processing …, 2019 - ieeexplore.ieee.org
With the development of the web's high usage, the number of malware affecting the system
are incresing. Various techniques have been used but they are incapable to identify …

An optimal intrusion detection system using GWO-CSA-DSAE model

PK Keserwani, MC Govil, E S. Pilli - Cyber-Physical Systems, 2021 - Taylor & Francis
In the high demand of the cloud computing environment, intrusion detection in a cloud
network playing a big role in maintaining the faith of the client (s). Due to the increasing …

RETRACTED ARTICLE: Research on data aggregation and transmission planning with Internet of Things technology in WSN multi-channel aware network

H Yue, Q Jiang, C Yin, J Wilson - The Journal of Supercomputing, 2020 - Springer
WSN contains a large number of sensor nodes deployed in the monitoring area. However,
due to the large number of nodes, short-distance communications, and limited resource and …

Fuzzy obstacle avoidance optimization of soccer robot based on an improved genetic algorithm

D Chen - Journal of Ambient Intelligence and Humanized …, 2020 - Springer
Due to its high-tech confrontation and entertainment, soccer robots have attracted a large
number of researchers to participate in it. Robot obstacle avoidance is an active research …

A self‐learning stream classifier for flow‐based botnet detection

M Nazemi Gelian, H Mashayekhi… - International Journal of …, 2019 - Wiley Online Library
Botnets have been recently recognized as one of the most formidable threats on the Internet.
Different approaches have been designed to detect these types of attacks. However, as …

Exploring the landscape of network security: a comparative analysis of attack detection strategies

P Rajesh Kanna, P Santhi - Journal of Ambient Intelligence and …, 2024 - Springer
The field of computer networking is experiencing rapid growth, accompanied by the swift
advancement of internet tools. As a result, people are becoming more aware of the …