7,881 Hits in 8.0 sec

A Novel Approach To Allocate Channels Dynamically In Wireless Mesh Networks

Y. Harold Robinson, M. Rajaram
2015 Zenodo  
In this paper, we use a hybrid multichannel multi radio wireless mesh networking architecture, where static and dynamic interfaces are built in the nodes.  ...  Many efforts have been used to maximizing throughput of the network in a multi-channel multi-radio wireless mesh network.  ...  Our method achieves lower delay than HMCP. III. NETWORK MODEL In this paper, we use hybrid architecture for both switching and changing of traffic overhead.  ... 
doi:10.5281/zenodo.1098966 fatcat:iezididjirbupme2zentggtxq4

A Novel Approach of Service Discovery Based on Tree Di-Rectory Architecture in Ad-Hoc Grid

Maysam Hedayati
2013 Advances in Networks  
Therefore, the geographical area of ad hoc network divide into a 2-D logical hierarchical grid and each cell in the grid, select a directory as agent cell.  ...  By using tree architecture, the whole directory is designed as a multi-layer tree. Then, the request of requestor can be search for service discovery from bottom to top.  ...  Discovery occurs when a service provider locates a lookup server by multicasting a request to the local network.  ... 
doi:10.11648/ fatcat:4mpfylcq6zctnopd32ug6pjl54

A Novel Approach to Control of Autonomous Microgrid Systems

M. I. Abouheaf, M. S. Mahmoud, S. Azher Hussain
2015 International Journal of Energy Engineering  
The control strategy is designed using a dynamic model of islanded microgrids and makes use of an internal oscillator for frequency control.  ...  A type of approximate dynamic programming method is used to solve the Bellman equation, namely heuristic dynamic programming. The proposed control strategy is based on actor-critic networks.  ...  ACKNOWLEDGMENTS The authors would like to thank the deanship for scientific research (DSR) at KFUPM for support through research group project RG1316-1.  ... 
doi:10.5963/ijee0505001 fatcat:23353myrlzb67p6dd4yclw2z3y

A novel Low-rate Denial of Service attack detection approach in ZigBee wireless sensor network by combining Hilbert-Huang Transformation and Trust Evaluation

Hongsong Chen, Caixia Meng, Zhiguang Shan, Zhongchuan Fu, Bharat K. Bhargava
2019 IEEE Access  
We have proposed a scalable LDoS attack detection architecture for both WSN and IoT.  ...  The routing protocol is vulnerable to many types of attacks in a wireless sensor network (WSN), which is an important network type of the Internet of Things (IoT).  ...  The novel detection architecture and approach will promote HHT and trust evaluation application for WSN and IoT security research.  ... 
doi:10.1109/access.2019.2903816 fatcat:tyqzhcdda5hwhjzbfvfr6b3n3i

A Novel Approach to the Job Shop Scheduling Problem Based on the Deep Q-Network in a Cooperative Multi-Access Edge Computing Ecosystem

Junhyung Moon, Minyeol Yang, Jongpil Jeong
2021 Sensors  
We tried to solve the job shop scheduling problem by applying DQN (deep Q-network), a reinforcement learning model, to this method.  ...  We proposed a method of independently performing scheduling at the edge of the network through cooperative scheduling between edge devices within a multi-access edge computing structure.  ...  Acknowledgments: This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (No. 2021R1F1A1060054).  ... 
doi:10.3390/s21134553 doaj:5709e2d781b947948a2fd79e6c8da322 fatcat:773mxn7dajfc5h4sni2dfl4r5q

A Novel Random Neural Network Based Approach for Intrusion Detection Systems

Ayyaz-Ul-Haq Qureshi, Hadi Larijani, Jawad Ahmad, Nhamoinesu Mtetwa
2018 2018 10th Computer Science and Electronic Engineering (CEEC)  
Computer security and privacy of user specific data is a prime concern in day to day communication.  ...  The performance is evaluated by training different numbers of input and hidden layer neurons with learning rates on benchmark NSL-KDD dataset for binary classification.  ...  Random Neural Network Model A novel class of artificial neural networks has been proposed by Gelenbe named as Random Neural Network (RNN) [13] .  ... 
doi:10.1109/ceec.2018.8674228 dblp:conf/ceec/QureshiLAM18 fatcat:rmddnwwz5zgojnaterkjvgpkbu

A Novel Approach to Site Selection: Collaborative Multi-Criteria Decision Making through Geo-Social Network (Case Study: Public Parking)

Zeinab Neisani Samani, Mohammad Karimi, Ali Alesheikh
2018 ISPRS International Journal of Geo-Information  
The presented approach utilized the analytic hierarchy process (AHP) as a multi-criteria decision method (MCDM) for weighting the criteria, which was completed in two stages; once by 50 experts, and then  ...  by three different levels of users, including 50 experts, 25 urban managers, and 150 pubic citizens, with respect to the case study area.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/ijgi7030082 fatcat:252zfi4ukjdflekrmakozhkwpq

Ultra-Low-Power IoT Communications: A novel address decoding approach for wake-up receivers [article]

Yousef Mafi, Fakhreddin Amirhosseini, Seied Ali Hosseini, Amin Azari, Meysam Masoudi, Mojtaba Vaezi
2021 arXiv   pre-print
Providing energy-efficient Internet of Things (IoT) connectivity has attracted significant attention in fifth-generation (5G) wireless networks and beyond.  ...  A potential solution for realizing a long-lasting network of IoT devices is to equip each IoT device with a wake-up receiver (WuR) to have always-accessible devices instead of always-on devices.  ...  Here, a novel address decoder architecture is proposed and evaluated in terms of power efficiency and reliability.  ... 
arXiv:2111.07607v1 fatcat:u6wq6ir4yrfm3lgbs5awy5bgaq

A Novel Approach to Trust Management in Unattended Wireless Sensor Networks

Yi Ren, Vladimir I. Zadorozhny, Vladimir A. Oleshchuk, Frank Y. Li
2014 IEEE Transactions on Mobile Computing  
Unattended Wireless Sensor Networks (UWSNs) are characterized by long periods of disconnected operation and fixed or irregular intervals between sink visits.  ...  Index Terms-Unattended wireless sensor network (UWSN), distributed trust management, subjective logic • Y. Ren is with the  ...  Zadorozhny's research was supported in part by the Research Council of Norway through the L. Eiriksson mobility program, project 209237. Y. Ren's research was  ... 
doi:10.1109/tmc.2013.22 fatcat:bve73e6u5zdr5oosch52dwjw7m

T‐SNERF: A novel high accuracy machine learning approach for Intrusion Detection Systems

Mohamed Hammad, Nabil Hewahi, Wael Elmedany
2021 IET Information Security  
Herein, a novel approach called T-Distributed Stochastic Neighbour Embedding and Random Forest Algorithm (T-SNERF) is presented for the classification of cyber-attacks.  ...  The proposed novel approach achieved significant results compared with existing approaches, achieving 100% accuracy, and 0% FPR for the UNSW-NB15 dataset, and achieving high accuracy rates, up to 99.7878%  ...  Also, a recent post-Internet network architecture called wireless sensor networks (WSN) is increasingly utilised.  ... 
doi:10.1049/ise2.12020 fatcat:kjgnzc5rcrdfrnkcredrleduwa

A Novel Approach for Enhancing the Network Life Time of Secure ML_RPL Routing Protocol in Internet of Things by Using PROB_ATT_SCHEME

Kishore Golla, Dept. of CSE, Andhra University, Visakhapatnam, Andhra Pradesh, India, S. Pallam Setty
2022 International Journal of Emerging Technology and Advanced Engineering  
the network, In present work, proposed a probability-based attestation scheme (PROB_ATT) for improving routing and security in IoT network.  ...  It is understood that it is necessary to do the necessary research for extending the network life time of resources constraint nodes existing in the network along with secure connection between nodes of  ...  Therefore, a novel, scalable and reliable attestation solutions are required for secure network operations of IoT devices [6] [7] .  ... 
doi:10.46338/ijetae0422_15 fatcat:hafimf3czzci5ovnbeoxfn5w2a

A Novel Fuzzy Search Approach over Encrypted Data with Improved Accuracy and Efficiency [article]

Jinkun Cao, Jinhao Zhu, Liwei Lin, Zhengui Xue, Ruhui Ma, Haibing Guan
2019 arXiv   pre-print
Besides, our approach is enhanced with novel data structures to improve search efficiency. These two innovations can work well for both accuracy and efficiency.  ...  To meet both end of security and searchability, search-supported encryption is proposed.  ...  Cryptography and Network Security.  ... 
arXiv:1904.12111v2 fatcat:cosfwknxhnfopiguc75nx3txk4

A Novel and Comprehensive Trust Estimation Clustering Based Approach for Large Scale Wireless Sensor Networks

Tayyab Khan, Karan Singh, Le Hoang Son, Mohamed Abdel-Basset, Hoang Viet Long, Satya P. Singh, Manisha Manjul
2019 IEEE Access  
In this paper, we propose a novel and comprehensive trust estimation approach (LTS) for large-scale WSN that employs clustering to improve cooperation, trustworthiness, and security by detecting malicious  ...  The theoretical and mathematical validations along with simulation results exhibit the great performance of our proposed approach in terms of trust evaluation cost, prevention, and detection of malicious  ...  [54] proposed a novel trust evaluation known as ''MITE: Memory integrity based trust evaluation in Wireless Sensor Networks.''  ... 
doi:10.1109/access.2019.2914769 fatcat:hafa4zmfbndwboiymkn3p5g7xq

A Novel Approach Towards Cost Effective Region-Based Group Key Agreement Protocol for Peer - to - Peer Information Sharing in Mobile Ad Hoc Networks [article]

K. Kumar, J. Nafeesa Begum, V. Sumathy
2010 arXiv   pre-print
Peer-to-peer systems have gained a lot of attention as information sharing systems for the widespread exchange of resources and voluminous information that is easily accessible among thousands of users  ...  sharing over MANETs becomes a promising research area.  ...  The P2P networks are a powerful architecture for sharing of resources and voluminous information among thousands of users.  ... 
arXiv:1011.0363v1 fatcat:hkhgmazr5vb53eu576jufhw22a

DQRE-SCnet: A novel hybrid approach for selecting users in Federated Learning with Deep-Q-Reinforcement Learning based on Spectral Clustering

Mohsen Ahmadi, Ali Taghavirashidizadeh, Danial Javaheri, Armin Masoumian, Saeid Jafarzadeh Ghoushchi, Yaghoub Pourasad
2021 Journal of King Saud University: Computer and Information Sciences  
Due to existing privacy and security concerns, most people avoid sensitive data sharing for training.  ...  of using these models.  ...  This study is carried out by evaluating and forming an implied correlation between the distribution of training data on a computer and the weight of the model being trained, indexing the distribution of  ... 
doi:10.1016/j.jksuci.2021.08.019 fatcat:li6c5pibqrgkbkhxhflypamo5e
« Previous Showing results 1 — 15 out of 7,881 results