Interleaved honeypot-framing model with secure mac policies for wireless sensor networks

R Soundararajan, M Rajagopal, A Muthuramalingam… - Sensors, 2022 - mdpi.com
The Wireless Medium Access Control (WMAC) protocol functions by handling various data
frames in order to forward them to neighbor sensor nodes. Under this circumstance, WMAC …

Smart Web Dictionary using OCR

S Verma, A Ashraf, B Rawat… - 2024 IEEE 1st Karachi …, 2024 - ieeexplore.ieee.org
Language and Linguistics has a significant impact on our daily processes that are larger
than we perceive. Language is a book that we utilize to convey ideas. Nowadays language …

Security Challenges in Mobile Cloud Computing

MS Khan, J Singh - 2024 IEEE 1st Karachi Section …, 2024 - ieeexplore.ieee.org
Mobile cloud computing is a technique through which you can store, process and retrieve
your data from anywhere in your mobile device via internet. In this mobile device act as a …

Employee Turnover Prediction Using Machine Learning

M Dhetarwal, A Ashraf, S Verma, Kavita… - … Conference On Innovative …, 2023 - Springer
This study goals to know the cause of the employees' benefits and organizational retention
tactics. Findings from critical research indicate that employees have rarer reasons to leave …

Analytic Hierarchy Process Based Medium Access Control Protocol for Multi Channel Wireless Sensor Networks

S Adhyapok, B Bhuyan, U Sharma… - 2023 OITS …, 2023 - ieeexplore.ieee.org
A medium access control (MAC) protocol for multi-channel wireless sensor network is
proposed in this paper. The sensor field under consideration is assumed to be clustered …

[PDF][PDF] Suspicious Firm Risk Score Predictor

R Agarwal, SV Mradula, L Vinjamuri, SA Zadeh - researchgate.net
This paper is based on a web application which was developed to make the decision-
making process of the corporate auditors easier and will help them to predict the risk of a …