Recent advances in use of bio-inspired jellyfish search algorithm for solving optimization problems

JS Chou, A Molla - Scientific Reports, 2022 - nature.com
The complexity of engineering optimization problems is increasing. Classical gradient-
based optimization algorithms are a mathematical means of solving complex problems …

Blockchain security enhancement: an approach towards hybrid consensus algorithms and machine learning techniques

K Venkatesan, SB Rahayu - Scientific Reports, 2024 - nature.com
In this paper, we propose hybrid consensus algorithms that combine machine learning (ML)
techniques to address the challenges and vulnerabilities in blockchain networks …

An improved high performance clustering based routing protocol for wireless sensor networks in IoT

MK Roberts, P Ramasamy - Telecommunication Systems, 2023 - Springer
Abstract The Internet of Things encompasses applications such as ecological, medicinal,
and defense surveillance that need real-time data collecting and standardization. Wireless …

An optimized ticket manager based energy‐aware multipath routing protocol design for IoT based wireless sensor networks

MK Roberts, J Thangavel - Concurrency and Computation …, 2022 - Wiley Online Library
Recently, wireless sensor networks (WSNs) and Internet of Things (IoTs) have emanated as
an indispensable assets that play a critical role in revolutionizing the field of data …

Block chain based trusted distributed routing scheme using optimized dropout ensemble extreme learning neural network in MANET

V Krishnakumar, R Asokan - Peer-to-Peer Networking and Applications, 2023 - Springer
Mobile ad hoc network (MANET) is a set of mobile nodes that communicate via wireless
networks while moving from one place to another. Numerous studies have been done on …

A Novel Blockchain Approach for Improving the Security and Reliability of Wireless Sensor Networks Using Jellyfish Search Optimizer

VL Vinya, Y Anuradha, HR Karimi, PB Divakarachari… - Electronics, 2022 - mdpi.com
For the past few years, centralized decision-making is being used for malicious node
identification in wireless sensor networks (WSNs). Generally, WSN is the primary technology …

IoT Based Fire Protection System

DD Kumar, B Bharathraj, VN Vishak… - 2023 4th …, 2023 - ieeexplore.ieee.org
This work introduces a fire Management system to track different kinds of fire attacks across
industries. While traditional research mostly focuses on creating fire sensing. Fire alarm …

Jellyfish Search Chimp Optimization Enabled Routing and Attack Detection in SDN based VANETs

U Kaur, AN Mahajan, S Kumar, K Dutta - Wireless Personal …, 2024 - Springer
Abstract In recent times, Vehicular Ad hoc Network (VANET) has been the focal point of the
research community to devise efficient smart transportation systems. VANET provides the …

Extreme learning machine optimized by artificial cell swarm optimization for the data fusion modal in WSNs

S Govindaraj, L Raja, S Velmurugan… - Peer-to-Peer Networking …, 2024 - Springer
Abstract Wireless Sensor Networks (WSNs) have gained substantial prominence in various
applications, like healthcare, and surveillance due to its data gathering ability. Effective data …

Blockchain abetted energy efficient archerfish hunting and Namib Beetle optimization algorithm espoused clustering protocol for wireless sensor network

AJ Wilson, G Ranganathan - Peer-to-Peer Networking and Applications, 2024 - Springer
Security and energy efficiency are regarded as the significant problems in the pervasive
wireless networks. Since widespread wireless networks rely on battery-operated nodes, it is …