Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Digital analysis of discrete fractional order worms transmission in wireless sensor systems: performance validation by artificial intelligence
This article deals with a novel non-linear discrete fractional-order mathematical model
connected with the spread of worms in the wireless sensor systems (WSSs). The proposed …
connected with the spread of worms in the wireless sensor systems (WSSs). The proposed …
An African vulture optimization algorithm based energy efficient clustering scheme in wireless sensor networks
Energy efficiency plays a major role in sustaining lifespan and stability of the network, being
one of most critical factors in wireless sensor networks (WSNs). To overcome the problem of …
one of most critical factors in wireless sensor networks (WSNs). To overcome the problem of …
Sink mobility model for wireless sensor networks using Kohonen self-organizing map
Wireless sensor networks are expected to operate in an unattended manner for long periods
of time. As a result, different mobility models were proposed by many research papers in …
of time. As a result, different mobility models were proposed by many research papers in …
[PDF][PDF] Sink mobility model for wireless sensor networks using genetic algorithm
Wireless sensor networks have been an interesting subject of research and have various
types of applications in different areas of interest. Thus, enhancing the performance of these …
types of applications in different areas of interest. Thus, enhancing the performance of these …
Energy efficient dynamic routing mechanism (EEDRM) with obstacles in WSN
Abstract In Wireless Sensor Networks, the in-built energy and processing capacity of
sensors should be reliably used to ensure effective use of resources. The major pitfalls in …
sensors should be reliably used to ensure effective use of resources. The major pitfalls in …
[PDF][PDF] Machine learning-based network intrusion detection: Performance evaluation and comparative analysis
Intrusion detection systems are used to investigate malicious behavior that takes place
within a system or network. Programming or equipment utilized for interruption identification …
within a system or network. Programming or equipment utilized for interruption identification …