Blockchain Based Multi-hop Routing and Cost-Effective Decentralized Storage System for Wireless Sensor Networks

M Faisal, G Husnain - Wireless Personal Communications, 2023 - Springer
Abstract In Wireless Sensor Networks, nodes have resource constraints such as storage
capacity, low energy, and computational power, etc. Due to which it directly affects the …

The Intelligent Mechanism for Data Collection and Data Mining in the Vehicular Ad-Hoc Networks (VANETs) Based on Big-Data-Driven

M Mahmoudian, SM Zanjani… - 2023 5th Global …, 2023 - ieeexplore.ieee.org
Big data technology has attracted the main attention of researchers in almost all sciences.
The Vehicular Ad-Hoc Network (VANET) enables information exchange between vehicles …

Optimal Layout Method for Roadside LiDAR and Camera

Y Li, H Zhang, Z Cheng, Z Wang, Z Zhang… - IEEE Access, 2024 - ieeexplore.ieee.org
With the widespread application of LiDAR and camera, the integration of LiDAR and camera
has become an urgent issue. In this study, we proposed a optimal layout method for …

Investigation and Morphing Attack Detection Techniques in Multimedia: A Detail Review

AU Rehman, M Mehran, M Ashfaq… - The …, 2023 - journals.qurtuba.edu.pk
Multimedia forensics is an emerging field that focuses on the analysis of digital media to
identify and authenticate digital evidence. It is a rapidly growing field that is being used in a …

Smart Parking System Approaches and Positioning Technologies: A Survey

M Darqaoui, M Coulibaly… - 2023 10th International …, 2023 - ieeexplore.ieee.org
In the realm of the smart city concept, every aspect of urban life is set to become intelligent,
spanning across buildings, manufacturing, healthcare, agriculture, and transportation. A …

[PDF][PDF] POSITION BASED ROUTING USING INTERNET CONTACT TO VANET THROUGH SATELLITE RECEIVE-ONLY TERMINAL.

SA Dulange, A Umashetty, S Hosmani - ICTACT Journal on …, 2024 - ictactjournals.in
The most challenging barrier to expanding connectivity of Internet to vehicle ad hoc
networks is the necessity for vast proper infrastructure of roadside network. This need is …

Intrusion Detection Using Machine Learning and Deep Learning Models on Cyber Security Attacks

I Khan, J Khan, SH Bangash, W Ahmad… - VFAST Transactions on …, 2024 - vfast.org
To detect and stop harmful activity in computer networks, network intrusion detection is an
essential part of cybersecurity defensive systems. It is becoming more difficult for traditional …

Privacy-Constrained Location Accuracy in CooperativeWearable Networks in Multi-Floor Buildings

ES Lohan, V Shubina - Proceedings of Work-in-Progress in Hardware …, 2023 - trepo.tuni.fi
This paper proposes a geometric dilution-of-precision approach to quantize the privacy-
aware location errors in a cooperative wearable network with opportunistic positioning. The …

Load-Aware and Priority Adaptive Traffic Congestion Control Method in Vehicular Ad Hoc Network

EM Tadesse, SA Demilew, AZ Mengesha, AD Geto - 2024 - preprints.org
Vehicular ad hoc networks (VANET) are a subset of mobile ad hoc networks used to
communicate between vehicles and infrastructure. During vehicular congestion …

[PDF][PDF] Performance Evaluation of Secured Virtual Private Network based on Dynamic Multipoint Virtual Private Network

I Ullah, M Yasir, IU Haq, G Husnain, SU Islam… - researchgate.net
In today's world, the globalization of businesses and non-profits is at an all-time high.
Companies are expanding their operations across the globe, which means that their main …