Energy enhancement of WSN using fuzzy C-means clustering algorithm

A Dagur, N Malik, P Tyagi, R Verma, R Sharma… - Data Intelligence and …, 2021 - Springer
The current issues in the wireless sensor networks (WSN) are to enhance the efficiency of
sensor nodes and their strength to handle node failure. This paper introduced an energy …

EN-NEAT: enhanced energy efficient threshold-based emergency data transmission routing protocol for wireless body area network

AA Ibrahim, O Bayat, ON Ucan, SA Eleruja - Third International Congress …, 2019 - Springer
Wireless body area network (WBAN) is a network composed of tiny sensor nodes that can
be placed on/in/around the body to measure physiological parameters in real time and …

Enhancing medical image super-resolution through generative adversarial networks and transformer-based joint feature learning

R Balamanigandan, R Mahaveerakannan… - Artificial Intelligence …, 2024 - taylorfrancis.com
Super-resolution reconstruction in medical imaging has become increasingly crucial for
obtaining high-quality images while minimizing radiation exposure, particularly in low-field …

Evaluation of the climate change in India using machine learning

J Jagannathan, C Divya, T Vadivel… - Artificial Intelligence …, 2024 - taylorfrancis.com
Climate change in India from 1900 to 2023 is a dynamic and evolving phenomenon that has
witnessed significant transformations and challenges over the past century. Over the past …

Computational optimization of the supervised classifiers using landsat-8 multispectral imagery

Y Soni, U Meena, VK Mishra - Artificial Intelligence and …, 2024 - taylorfrancis.com
The spectrum responses of the various biophysical materials on the globe are provided via
satellite images. These spectral responses must be converted into LULC (Land Use Land …

Securing the internet of things: Investigating common attacks and defense strategies for a resilient ecosystem

R Papalkar, AS Alvi, J Jadhav, R Agnihotri… - Artificial Intelligence …, 2025 - taylorfrancis.com
The rapid spread of Internet of Things (IoT) devices has brought about unparalleled
connectivity and efficiency in different fields. Nevertheless, the complex network …

Enhancing cybersecurity through lexical analysis of URLs for phishing detection and accuracy modeling

P Sharma - Artificial Intelligence and Information Technologies, 2025 - taylorfrancis.com
Phishing attacks pose a threat to many organizations, causing economic harm, data breaks
and identity theft. Investigating phishing attacks is a difficult task due to the evolution of …

Performance and energy balanced scheduling algorithm for multicore architectures

KV Kumar - Artificial Intelligence and Information Technologies - taylorfrancis.com
Due to the widespread use of digital home appliances, network gadgets, mobile devices,
and information products, etc., embedded device use has recently skyrocketed in our daily …

Inverse Rate Monotonic Technique for reduced energy consumption of weakly hard real time systems

S Agrawal, A Jain, I Wali, T Kaur - International Conference on …, 2014 - ieeexplore.ieee.org
This paper proposes a simple scheduling algorithm to minimize the energy consumption in
weakly hard real time systems. It uses the (m, k)-model, which requires at least m out of k …