A cluster-based trusted routing method using fire hawk optimizer (FHO) in wireless sensor networks (WSNs)

M Hosseinzadeh, J Yoo, S Ali, J Lansky, S Mildeova… - Scientific Reports, 2023 - nature.com
Today, wireless sensor networks (WSNs) are growing rapidly and provide a lot of comfort to
human life. Due to the use of WSNs in various areas, like health care and battlefield, security …

Yolov5-ac: Attention mechanism-based lightweight yolov5 for track pedestrian detection

H Lv, H Yan, K Liu, Z Zhou, J Jing - Sensors, 2022 - mdpi.com
In response to the dangerous behavior of pedestrians roaming freely on unsupervised train
tracks, the real-time detection of pedestrians is urgently required to ensure the safety of …

Prediction of network traffic in wireless mesh networks using hybrid deep learning model

S Mahajan, R HariKrishnan, K Kotecha - IEEE Access, 2022 - ieeexplore.ieee.org
Wireless mesh networks are getting adopted in the domain of network communication. Their
main benefits include adaptability, configuration, and flexibility, with added efficiency in cost …

Research on pedestrian detection and deepsort tracking in front of intelligent vehicle based on deep learning

X Chen, Y Jia, X Tong, Z Li - Sustainability, 2022 - mdpi.com
In order to improve the tracking failure caused by small-target pedestrians and partially
blocked pedestrians in dense crowds in complex environments, a pedestrian target …

Security, privacy, and robustness for trustworthy AI systems: A review

MM Saeed, M Alsharidah - Computers and Electrical Engineering, 2024 - Elsevier
This review article provides a comprehensive exploration of the key pillars of trustworthy AI:
security privacy and robustness. The article delved into security measures both traditional …

Detecting noncooperation nodes mechanisms in wireless networks: a survey

S Nobahary, H Gharaee Garakani… - Security and …, 2022 - Wiley Online Library
Wireless networks face security problems compared with traditional wired networks. In
wireless networks such as wireless sensor networks (WSNs), mobile ad hoc networks …

Selfish node detection based on fuzzy logic and Harris hawks optimization algorithm in IoT networks

A Akhbari, A Ghaffari - Security and Communication Networks, 2021 - Wiley Online Library
The Internet of things describes a network of physical things for example,“things” that are
connected with the sensors, software, and other technologies to connect and exchange data …

Energy-Efficient Opportunistic Routing Algorithm for Post-Disaster Mine Internet of Things Networks

Q Zhao, W Yang, L Zhang - Sensors, 2023 - mdpi.com
The Mine Internet of Things (MIoT), as a key technology for reconstructing post-disaster
communication networks, enables a user to monitor and control the safety of an affected …

A reliable method for data aggregation on the industrial internet of things using a hybrid optimization algorithm and density correlation degree

A Heidari, H Shishehlou, M Darbandi, NJ Navimipour… - Cluster …, 2024 - Springer
Abstract The Internet of Things (IoT) is a new information technology sector in which each
device may receive and distribute data across a network. Industrial IoT (IIoT) and related …

Selfish node detection in ad hoc networks based on fuzzy logic

H Hasani, S Babaie - Neural Computing and Applications, 2019 - Springer
Generally, the ad hoc networks work correctly only if all nodes cooperate in the routing and
forwarding of the packets. However, in some cases, selfish nodes are hesitated to share the …