A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Novel Approach To Allocate Channels Dynamically In Wireless Mesh Networks
2015
Zenodo
In this paper, we use a hybrid multichannel multi radio wireless mesh networking architecture, where static and dynamic interfaces are built in the nodes. ...
Many efforts have been used to maximizing throughput of the network in a multi-channel multi-radio wireless mesh network. ...
Our method achieves lower delay than HMCP.
III. NETWORK MODEL In this paper, we use hybrid architecture for both switching and changing of traffic overhead. ...
doi:10.5281/zenodo.1098966
fatcat:iezididjirbupme2zentggtxq4
A Novel Approach of Service Discovery Based on Tree Di-Rectory Architecture in Ad-Hoc Grid
2013
Advances in Networks
Therefore, the geographical area of ad hoc network divide into a 2-D logical hierarchical grid and each cell in the grid, select a directory as agent cell. ...
By using tree architecture, the whole directory is designed as a multi-layer tree. Then, the request of requestor can be search for service discovery from bottom to top. ...
Discovery occurs when a service provider locates a lookup server by multicasting a request to the local network. ...
doi:10.11648/j.net.20130101.11
fatcat:4mpfylcq6zctnopd32ug6pjl54
A Novel Approach to Control of Autonomous Microgrid Systems
2015
International Journal of Energy Engineering
The control strategy is designed using a dynamic model of islanded microgrids and makes use of an internal oscillator for frequency control. ...
A type of approximate dynamic programming method is used to solve the Bellman equation, namely heuristic dynamic programming. The proposed control strategy is based on actor-critic networks. ...
ACKNOWLEDGMENTS The authors would like to thank the deanship for scientific research (DSR) at KFUPM for support through research group project RG1316-1. ...
doi:10.5963/ijee0505001
fatcat:23353myrlzb67p6dd4yclw2z3y
A novel Low-rate Denial of Service attack detection approach in ZigBee wireless sensor network by combining Hilbert-Huang Transformation and Trust Evaluation
2019
IEEE Access
We have proposed a scalable LDoS attack detection architecture for both WSN and IoT. ...
The routing protocol is vulnerable to many types of attacks in a wireless sensor network (WSN), which is an important network type of the Internet of Things (IoT). ...
The novel detection architecture and approach will promote HHT and trust evaluation application for WSN and IoT security research. ...
doi:10.1109/access.2019.2903816
fatcat:tyqzhcdda5hwhjzbfvfr6b3n3i
A Novel Approach to the Job Shop Scheduling Problem Based on the Deep Q-Network in a Cooperative Multi-Access Edge Computing Ecosystem
2021
Sensors
We tried to solve the job shop scheduling problem by applying DQN (deep Q-network), a reinforcement learning model, to this method. ...
We proposed a method of independently performing scheduling at the edge of the network through cooperative scheduling between edge devices within a multi-access edge computing structure. ...
Acknowledgments: This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (No. 2021R1F1A1060054). ...
doi:10.3390/s21134553
doaj:5709e2d781b947948a2fd79e6c8da322
fatcat:773mxn7dajfc5h4sni2dfl4r5q
A Novel Random Neural Network Based Approach for Intrusion Detection Systems
2018
2018 10th Computer Science and Electronic Engineering (CEEC)
Computer security and privacy of user specific data is a prime concern in day to day communication. ...
The performance is evaluated by training different numbers of input and hidden layer neurons with learning rates on benchmark NSL-KDD dataset for binary classification. ...
Random Neural Network Model A novel class of artificial neural networks has been proposed by Gelenbe named as Random Neural Network (RNN) [13] . ...
doi:10.1109/ceec.2018.8674228
dblp:conf/ceec/QureshiLAM18
fatcat:rmddnwwz5zgojnaterkjvgpkbu
A Novel Approach to Site Selection: Collaborative Multi-Criteria Decision Making through Geo-Social Network (Case Study: Public Parking)
2018
ISPRS International Journal of Geo-Information
The presented approach utilized the analytic hierarchy process (AHP) as a multi-criteria decision method (MCDM) for weighting the criteria, which was completed in two stages; once by 50 experts, and then ...
by three different levels of users, including 50 experts, 25 urban managers, and 150 pubic citizens, with respect to the case study area. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/ijgi7030082
fatcat:252zfi4ukjdflekrmakozhkwpq
Ultra-Low-Power IoT Communications: A novel address decoding approach for wake-up receivers
[article]
2021
arXiv
pre-print
Providing energy-efficient Internet of Things (IoT) connectivity has attracted significant attention in fifth-generation (5G) wireless networks and beyond. ...
A potential solution for realizing a long-lasting network of IoT devices is to equip each IoT device with a wake-up receiver (WuR) to have always-accessible devices instead of always-on devices. ...
Here, a novel address decoder architecture is proposed and evaluated in terms of power efficiency and reliability. ...
arXiv:2111.07607v1
fatcat:u6wq6ir4yrfm3lgbs5awy5bgaq
A Novel Approach to Trust Management in Unattended Wireless Sensor Networks
2014
IEEE Transactions on Mobile Computing
Unattended Wireless Sensor Networks (UWSNs) are characterized by long periods of disconnected operation and fixed or irregular intervals between sink visits. ...
Index Terms-Unattended wireless sensor network (UWSN), distributed trust management, subjective logic • Y. Ren is with the ...
Zadorozhny's research was supported in part by the Research Council of Norway through the L. Eiriksson mobility program, project 209237. Y. Ren's research was ...
doi:10.1109/tmc.2013.22
fatcat:bve73e6u5zdr5oosch52dwjw7m
T‐SNERF: A novel high accuracy machine learning approach for Intrusion Detection Systems
2021
IET Information Security
Herein, a novel approach called T-Distributed Stochastic Neighbour Embedding and Random Forest Algorithm (T-SNERF) is presented for the classification of cyber-attacks. ...
The proposed novel approach achieved significant results compared with existing approaches, achieving 100% accuracy, and 0% FPR for the UNSW-NB15 dataset, and achieving high accuracy rates, up to 99.7878% ...
Also, a recent post-Internet network architecture called wireless sensor networks (WSN) is increasingly utilised. ...
doi:10.1049/ise2.12020
fatcat:kjgnzc5rcrdfrnkcredrleduwa
A Novel Approach for Enhancing the Network Life Time of Secure ML_RPL Routing Protocol in Internet of Things by Using PROB_ATT_SCHEME
2022
International Journal of Emerging Technology and Advanced Engineering
the network, In present work, proposed a probability-based attestation scheme (PROB_ATT) for improving routing and security in IoT network. ...
It is understood that it is necessary to do the necessary research for extending the network life time of resources constraint nodes existing in the network along with secure connection between nodes of ...
Therefore, a novel, scalable and reliable attestation solutions are required for secure network operations of IoT devices [6] [7] . ...
doi:10.46338/ijetae0422_15
fatcat:hafimf3czzci5ovnbeoxfn5w2a
A Novel Fuzzy Search Approach over Encrypted Data with Improved Accuracy and Efficiency
[article]
2019
arXiv
pre-print
Besides, our approach is enhanced with novel data structures to improve search efficiency. These two innovations can work well for both accuracy and efficiency. ...
To meet both end of security and searchability, search-supported encryption is proposed. ...
Cryptography and Network Security. ...
arXiv:1904.12111v2
fatcat:cosfwknxhnfopiguc75nx3txk4
A Novel and Comprehensive Trust Estimation Clustering Based Approach for Large Scale Wireless Sensor Networks
2019
IEEE Access
In this paper, we propose a novel and comprehensive trust estimation approach (LTS) for large-scale WSN that employs clustering to improve cooperation, trustworthiness, and security by detecting malicious ...
The theoretical and mathematical validations along with simulation results exhibit the great performance of our proposed approach in terms of trust evaluation cost, prevention, and detection of malicious ...
[54] proposed a novel trust evaluation known as ''MITE: Memory integrity based trust evaluation in Wireless Sensor Networks.'' ...
doi:10.1109/access.2019.2914769
fatcat:hafa4zmfbndwboiymkn3p5g7xq
A Novel Approach Towards Cost Effective Region-Based Group Key Agreement Protocol for Peer - to - Peer Information Sharing in Mobile Ad Hoc Networks
[article]
2010
arXiv
pre-print
Peer-to-peer systems have gained a lot of attention as information sharing systems for the widespread exchange of resources and voluminous information that is easily accessible among thousands of users ...
sharing over MANETs becomes a promising research area. ...
The P2P networks are a powerful architecture for sharing of resources and voluminous information among thousands of users. ...
arXiv:1011.0363v1
fatcat:hkhgmazr5vb53eu576jufhw22a
DQRE-SCnet: A novel hybrid approach for selecting users in Federated Learning with Deep-Q-Reinforcement Learning based on Spectral Clustering
2021
Journal of King Saud University: Computer and Information Sciences
Due to existing privacy and security concerns, most people avoid sensitive data sharing for training. ...
of using these models. ...
This study is carried out by evaluating and forming an implied correlation between the distribution of training data on a computer and the weight of the model being trained, indexing the distribution of ...
doi:10.1016/j.jksuci.2021.08.019
fatcat:li6c5pibqrgkbkhxhflypamo5e
« Previous
Showing results 1 — 15 out of 7,881 results