Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (202)
  • Open Access

    ARTICLE

    Reinforcement Learning to Improve QoS and Minimizing Delay in IoT

    Mahendrakumar Subramaniam1,*, V. Vedanarayanan2, Azath Mubarakali3, S. Sathiya Priya4

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1603-1612, 2023, DOI:10.32604/iasc.2023.032396

    Abstract Machine Learning concepts have raised executions in all knowledge domains, including the Internet of Thing (IoT) and several business domains. Quality of Service (QoS) has become an important problem in IoT surrounding since there is a vast explosion of connecting sensors, information and usage. Sensor data gathering is an efficient solution to collect information from spatially disseminated IoT nodes. Reinforcement Learning Mechanism to improve the QoS (RLMQ) and use a Mobile Sink (MS) to minimize the delay in the wireless IoT s proposed in this paper. Here, we use machine learning concepts like Reinforcement Learning… More >

  • Open Access

    ARTICLE

    Energy-Efficient Routing Protocol with Multi-Hop Fuzzy Logic for Wireless Networks

    J. Gobinath1,*, S. Hemajothi2, J. S. Leena Jasmine3

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 2457-2471, 2023, DOI:10.32604/iasc.2023.031171

    Abstract A Wireless Sensor Network (WSN) becomes a newer type of real-time embedded device that can be utilized for a wide range of applications that make regular networking which appears impracticable. Concerning the energy production of the nodes, WSN has major issues that may influence the stability of the system. As a result, constructing WSN requires devising protocols and standards that make the most use of constrained capacity, especially the energy resources. WSN faces some issues with increased power utilization and an on going development due to the uneven energy usage between the nodes. Clustering has… More >

  • Open Access

    ARTICLE

    Clustered Wireless Sensor Network in Precision Agriculture via Graph Theory

    L. R. Bindu1,*, P. Titus2, D. Dhanya3

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1435-1449, 2023, DOI:10.32604/iasc.2023.030591

    Abstract Food security and sustainable development is making a mandatory move in the entire human race. The attainment of this goal requires man to strive for a highly advanced state in the field of agriculture so that he can produce crops with a minimum amount of water and fertilizer. Even though our agricultural methodologies have undergone a series of metamorphoses in the process of a present smart-agricultural system, a long way is ahead to attain a system that is precise and accurate for the optimum yield and profitability. Towards such a futuristic method of cultivation, this… More >

  • Open Access

    ARTICLE

    Modified Adhoc On-Demand Distance Vector for Trust Evaluation And Attack Detection

    S. Soundararajan1,*, B. R. Tapas Bapu2, C. Kotteeswaran1, S. Venkatasubramanian3, P. J. Sathish Kumar4, Ahmed Mudassar Ali2

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1227-1240, 2023, DOI:10.32604/iasc.2023.025752

    Abstract Recently, Wireless Sensor Network (WSN) becomes most potential technologies for providing improved services to several data gathering and tracking applications. Because of the wireless medium, multi-hop communication, absence of physical protectivity, and accumulated traffic, WSN is highly vulnerable to security concerns. Therefore, this study explores a specific type of DoS attack identified as a selective forwarding attack where the misbehaving node in the network drops packet on a selective basis. It is challenging to determine if packet loss is caused by a collision in the medium access path, poor channel quality, or a selective forwarding More >

  • Open Access

    ARTICLE

    CEER: Cooperative Energy-Efficient Routing Mechanism for Underwater Wireless Sensor Networks Using Clusters

    Sayyed Mudassar Shah1, Tariq Hussain2, Babar Shah3, Farman Ali4, Khalid Zaman1, Kyung-Sup Kwak5,*

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2587-2602, 2023, DOI:10.32604/csse.2023.034489

    Abstract Underwater acoustic sensor networks (UWASNs) aim to find varied offshore ocean monitoring and exploration applications. In most of these applications, the network is composed of several sensor nodes deployed at different depths in the water. Sensor nodes located at depth on the seafloor cannot invariably communicate with nodes close to the surface level; these nodes need multi-hop communication facilitated by a suitable routing scheme. In this research work, a Cluster-based Cooperative Energy Efficient Routing (CEER) mechanism for UWSNs is proposed to overcome the shortcomings of the Co-UWSN and LEACH mechanisms. The optimal role of clustering… More >

  • Open Access

    ARTICLE

    Deep Forest-Based Fall Detection in Internet of Medical Things Environment

    Mohamed Esmail Karar1,2,*, Omar Reyad1,3, Hazem Ibrahim Shehata1,4

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2377-2389, 2023, DOI:10.32604/csse.2023.032931

    Abstract This article introduces a new medical internet of things (IoT) framework for intelligent fall detection system of senior people based on our proposed deep forest model. The cascade multi-layer structure of deep forest classifier allows to generate new features at each level with minimal hyperparameters compared to deep neural networks. Moreover, the optimal number of the deep forest layers is automatically estimated based on the early stopping criteria of validation accuracy value at each generated layer. The suggested forest classifier was successfully tested and evaluated using a public SmartFall dataset, which is acquired from three-axis… More >

  • Open Access

    ARTICLE

    Logistic Regression with Elliptical Curve Cryptography to Establish Secure IoT

    J. R. Arunkumar1,*, S. Velmurugan2, Balarengadurai Chinnaiah3, G. Charulatha4, M. Ramkumar Prabhu4, A. Prabhu Chakkaravarthy5

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2635-2645, 2023, DOI:10.32604/csse.2023.031605

    Abstract Nowadays, Wireless Sensor Network (WSN) is a modern technology with a wide range of applications and greatly attractive benefits, for example, self-governing, low expenditure on execution and data communication, long-term function, and unsupervised access to the network. The Internet of Things (IoT) is an attractive, exciting paradigm. By applying communication technologies in sensors and supervising features, WSNs have initiated communication between the IoT devices. Though IoT offers access to the highest amount of information collected through WSNs, it leads to privacy management problems. Hence, this paper provides a Logistic Regression machine learning with the Elliptical More >

  • Open Access

    ARTICLE

    Authentication of WSN for Secured Medical Data Transmission Using Diffie Hellman Algorithm

    A. Jenice Prabhu1,*, D. Hevin Rajesh2

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2363-2376, 2023, DOI:10.32604/csse.2023.028089

    Abstract The applications of wireless sensor network (WSN) exhibits a significant rise in recent days since it is enveloped with various advantageous benefits. In the medical field, the emergence of WSN has created marvelous changes in monitoring the health conditions of the patients and so it is attracted by doctors and physicians. WSN assists in providing health care services without any delay and so it plays predominant role in saving the life of human. The data of different persons, time, places and networks have been linked with certain devices, which are collectively known as Internet of… More >

  • Open Access

    ARTICLE

    Enhanced Security with Improved Defensive Routing Mechanism in Wireless Sensor Networks

    R. Sabitha1,*, C. Gokul Prasad2, S. Karthik1

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2795-2810, 2023, DOI:10.32604/csse.2023.026465

    Abstract In recent scenario of Wireless Sensor Networks (WSNs), there are many application developed for handling sensitive and private data such as military information, surveillance data, tracking, etc. Hence, the sensor nodes of WSNs are distributed in an intimidating region, which is non-rigid to attacks. The recent research domains of WSN deal with models to handle the WSN communications against malicious attacks and threats. In traditional models, the solution has been made for defending the networks, only to specific attacks. However, in real-time applications, the kind of attack that is launched by the adversary is not… More >

  • Open Access

    ARTICLE

    Trusted Cluster-Based Communication for Wireless Sensor Network Using Meta-Heuristic Algorithms

    Pankaj Kumar Sharma1,*, Uma Shankar Modani2

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1935-1951, 2023, DOI:10.32604/csse.2023.031509

    Abstract The mobile transient and sensor network’s routing algorithm detects available multi-hop paths between source and destination nodes. However, some methods are not as reliable or trustworthy as expected. Therefore, finding a reliable method is an important factor in improving communication security. For further enhancement of protected communication, we suggest a trust cluster based secure routing (TCSR) framework for wireless sensor network (WSN) using optimization algorithms. First, we introduce an efficient cluster formation using a modified tug of war optimization (MTWO) algorithm, which provides load-balanced clusters for energy-efficient data transmission. Second, we illustrate the optimal head… More >

Displaying 31-40 on page 4 of 202. Per Page