Security challenges of internet of underwater things: A systematic literature review
Water covers approximately 71% of the earth surface, yet much of the underwater world
remains unexplored due to technology limitations. Internet of Underwater Things (IoUT) is a …
remains unexplored due to technology limitations. Internet of Underwater Things (IoUT) is a …
Adaptive bat optimization algorithm for efficient load balancing in cloud computing environment
Cloud computing is the new development technology where it permit users as much as
needed with its greater performance. Where the cloud computing is a heterogeneous …
needed with its greater performance. Where the cloud computing is a heterogeneous …
EBH-DBR: Energy-balanced hybrid depth-based routing protocol for underwater wireless sensor networks
Recently, applications of underwater wireless sensor networks like environment monitoring,
underwater life imaging, tactical surveillance, ocean floor monitoring demand a persistent …
underwater life imaging, tactical surveillance, ocean floor monitoring demand a persistent …
Machine Learning Based Energy Efficient High Performance Routing Protocol for Underwater Communication.
Acoustic data communication is a powerful technology for underwater communication
implementation. Underwater wireless information transmission holds immense significance …
implementation. Underwater wireless information transmission holds immense significance …
Load balanced and optimal clustering in WSNs using grey wolf optimizer
Lekhraj, A Kumar, A Kumar - International Journal of System Assurance …, 2024 - Springer
A network of wireless sensors (WSN) is an outstanding technology that can aid in the
various applications. Batteries run the sensor nodes those are used in WSN. The battery is …
various applications. Batteries run the sensor nodes those are used in WSN. The battery is …
Decision tree-based event detection framework for UWSN routing to optimize energy consumption during transmission
In this article, a novel framework for event detection is proposed to detect event on the basis
of data priority. The priority of critical time-bounded events is considering as critical event …
of data priority. The priority of critical time-bounded events is considering as critical event …
Investigations on power-aware solutions in low power sensor networks
SS Vidhya, S Mathi - Inventive Communication and Computational …, 2022 - Springer
Power management is a very vast topic and the solution spans around hardware and
software approaches. The power efficiency of IoT low-power devices becomes an important …
software approaches. The power efficiency of IoT low-power devices becomes an important …
Improved ant colony optimization for optimal resource utilization in cloud computing
D Bhardwaj, AK Gupta, A Sharma - Advances in Computational …, 2022 - Springer
Recently, cloud computing is an evolving research field deployed for computing by many
researchers. The computing is offered as a service in cloud which is regarded as novel …
researchers. The computing is offered as a service in cloud which is regarded as novel …
[PDF][PDF] Identification of speech signal in moving objects using artificial neural network system
D Bhardwaj, RK Galav - European Journal of Molecular & Clinical …, 2020 - academia.edu
The speech signal moving objects regarding the speaker's personality. A speaker
recognition field is about retrieving the name of the individual voicing the speech. The …
recognition field is about retrieving the name of the individual voicing the speech. The …
Key based secured cryptosystems used for online data sharing on the cloud
SH Ahammad, R Revathi, AM Alaiyah… - AIP Conference …, 2024 - pubs.aip.org
Since the development of cloud computing, it has become a platform that is both efficient
and effective for large businesses, firms, and people to use in order to share data. Cloud …
and effective for large businesses, firms, and people to use in order to share data. Cloud …