Secure opportunistic watchdog production in wireless sensor networks: a review

S Rajasoundaran, AV Prabu, GS Kumar… - Wireless Personal …, 2021 - Springer
Finding the security vulnerabilities and solving the issues in Wireless Sensor Networks
(WSN) are mandatory tasks for providing secure data transmission. Attackers or intruders …

Analysis and prediction of diabetes using machine learning

S Saru, S Subashree - International journal of emerging technology …, 2019 - papers.ssrn.com
Healthcare industry contains very large and sensitive data and needs to be handled very
carefully. Diabetes Mellitus is one of the growing extremely fatal diseases all over the world …

Black hole attack prevention in mobile ad-hoc network (manet) using ant colony optimization technique

DM Khan, T Aslam, N Akhtar, S Qadri… - … Technology and Control, 2020 - itc.ktu.lt
The Mobile ad-hoc networks are auto configured systems where hubs can travel towards
any direction. It doesn't rely on any other frame to build the framework. Because of its …

[PDF][PDF] Churn prediction in telecom using classification algorithms

G ApurvaSree, S Ashika, S Karthi… - International Journal of …, 2019 - academia.edu
Customershaveawiderangeoftelecomservic… industryandswitchingfromoneservicetoother…
[2], increasedcustomerchurnisalwaysamajorco… today [3]. Theaccuracyratealsomakesustoknowaboutt …

Intelligent detection of untrusted data transmission to optimize energy in sensor networks

D Yuvaraj, M Sivaram… - Journal of Information …, 2020 - Taylor & Francis
Nowadays environmental conditions are monitored using distributed sensors that react to
the environment conditions and send the collected data over wireless channels. Every …

[图书][B] An Eeg based emotion recognition and classification using machine learning techniques

Akalya devi C, Dr. Karthika Renuka D, S Soundarya - 2019 - researchgate.net
Emotions are complex phenomena that play significant roles in the quality of human life.
Emotion plays a major role in motivation, perception, cognition, creativity, attention, learning …

High capacity and optimized image steganography technique based on ant colony optimization algorithm

A Piya - … (International Journal of Information System and …, 2019 - jurnal.stmikpringsewu.ac.id
The tremendous development of digital technology, it is mandatory to address the security
while transmitting information over network in a way that observer couldn't depict it …

[PDF][PDF] International Journal of Advanced Trends in Computer Science and Engineering

AM Alqudah, H Alquraan, IA Qasmieh, A Alqudah… - International …, 2019 - arxiv.org
Deep Learning is the newest and the current trend of the machine learning field that paid a
lot of the researchers' attention in the recent few years. As a proven powerful machine …

Оптимізація пропускних здатностей каналів зв'язку гіперконвергентної системи

N Kuchuk, N Lukova-Chuiko… - … управління, навігації та …, 2019 - journals.nupp.edu.ua
Анотація Завдання оптимізації пропускних здатностей каналів зв'язку
гіперконвергентної системи потребує застосування сучасних математичних і …

[PDF][PDF] Algorithm of information security risk assessment based on fuzzy-multiple approach

S Yevseiev, O Shmatko… - Сучасні інформаційні …, 2019 - irbis-nbuv.gov.ua
The subject of the study is the process of assessing the level of information security risk that
is being implemented with the help of the fuzzy logic apparatus. The purpose of this work is …