Digital analysis of discrete fractional order worms transmission in wireless sensor systems: performance validation by artificial intelligence

A Khan, T Abdeljawad, HM Alkhawar - Modeling Earth Systems and …, 2025‏ - Springer
This article deals with a novel non-linear discrete fractional-order mathematical model
connected with the spread of worms in the wireless sensor systems (WSSs). The proposed …

An African vulture optimization algorithm based energy efficient clustering scheme in wireless sensor networks

M Kumar, A Kumar, S Kumar, P Chauhan… - Scientific Reports, 2024‏ - nature.com
Energy efficiency plays a major role in sustaining lifespan and stability of the network, being
one of most critical factors in wireless sensor networks (WSNs). To overcome the problem of …

Sink mobility model for wireless sensor networks using Kohonen self-organizing map

AA Taleb - International Journal of Communication Networks …, 2021‏ - search.proquest.com
Wireless sensor networks are expected to operate in an unattended manner for long periods
of time. As a result, different mobility models were proposed by many research papers in …

[PDF][PDF] Sink mobility model for wireless sensor networks using genetic algorithm

AA Taleb - Journal of Theoretical and Applied Information …, 2021‏ - jatit.org
Wireless sensor networks have been an interesting subject of research and have various
types of applications in different areas of interest. Thus, enhancing the performance of these …

Energy efficient dynamic routing mechanism (EEDRM) with obstacles in WSN

S Selvaraj, S Vasanthamani - Wireless Personal Communications, 2020‏ - Springer
Abstract In Wireless Sensor Networks, the in-built energy and processing capacity of
sensors should be reliably used to ensure effective use of resources. The major pitfalls in …

[PDF][PDF] Machine learning-based network intrusion detection: Performance evaluation and comparative analysis

B Kumari, V Singh, M Kumar‏ - … .s3.ap-south-1.amazonaws.com
Intrusion detection systems are used to investigate malicious behavior that takes place
within a system or network. Programming or equipment utilized for interruption identification …