Security challenges of internet of underwater things: A systematic literature review

AG Yisa, T Dargahi, S Belguith… - Transactions on …, 2021 - Wiley Online Library
Water covers approximately 71% of the earth surface, yet much of the underwater world
remains unexplored due to technology limitations. Internet of Underwater Things (IoUT) is a …

Adaptive bat optimization algorithm for efficient load balancing in cloud computing environment

R Kumar, D Bhardwaj, R Joshi - Advances in Computational Intelligence …, 2022 - Springer
Cloud computing is the new development technology where it permit users as much as
needed with its greater performance. Where the cloud computing is a heterogeneous …

EBH-DBR: Energy-balanced hybrid depth-based routing protocol for underwater wireless sensor networks

R Kumar, D Bhardwaj, MK Mishra - Modern Physics Letters B, 2021 - World Scientific
Recently, applications of underwater wireless sensor networks like environment monitoring,
underwater life imaging, tactical surveillance, ocean floor monitoring demand a persistent …

Machine Learning Based Energy Efficient High Performance Routing Protocol for Underwater Communication.

N Krishnapriya, N Kumareshan - Adhoc & Sensor Wireless …, 2022 - search.ebscohost.com
Acoustic data communication is a powerful technology for underwater communication
implementation. Underwater wireless information transmission holds immense significance …

Load balanced and optimal clustering in WSNs using grey wolf optimizer

Lekhraj, A Kumar, A Kumar - International Journal of System Assurance …, 2024 - Springer
A network of wireless sensors (WSN) is an outstanding technology that can aid in the
various applications. Batteries run the sensor nodes those are used in WSN. The battery is …

Decision tree-based event detection framework for UWSN routing to optimize energy consumption during transmission

R Kumar, D Bhardwaj - Advanced Computing and Intelligent Technologies …, 2022 - Springer
In this article, a novel framework for event detection is proposed to detect event on the basis
of data priority. The priority of critical time-bounded events is considering as critical event …

Investigations on power-aware solutions in low power sensor networks

SS Vidhya, S Mathi - Inventive Communication and Computational …, 2022 - Springer
Power management is a very vast topic and the solution spans around hardware and
software approaches. The power efficiency of IoT low-power devices becomes an important …

Improved ant colony optimization for optimal resource utilization in cloud computing

D Bhardwaj, AK Gupta, A Sharma - Advances in Computational …, 2022 - Springer
Recently, cloud computing is an evolving research field deployed for computing by many
researchers. The computing is offered as a service in cloud which is regarded as novel …

[PDF][PDF] Identification of speech signal in moving objects using artificial neural network system

D Bhardwaj, RK Galav - European Journal of Molecular & Clinical …, 2020 - academia.edu
The speech signal moving objects regarding the speaker's personality. A speaker
recognition field is about retrieving the name of the individual voicing the speech. The …

Key based secured cryptosystems used for online data sharing on the cloud

SH Ahammad, R Revathi, AM Alaiyah… - AIP Conference …, 2024 - pubs.aip.org
Since the development of cloud computing, it has become a platform that is both efficient
and effective for large businesses, firms, and people to use in order to share data. Cloud …