Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 30, Issue 22024Current Issue
Reflects downloads up to 30 Aug 2024Bibliometrics
Skip Table Of Content Section
research-article
GDPR compliance through standard security controls: An automated approach

Since 2018, the enactment of the General Data Protection Regulation (GDPR) has bestowed distinct privileges upon each person while imposing protocols to safeguard personal information. The GDPR effectively tackles an evident requirement within our ...

research-article
Research on fault detection and remote monitoring system of variable speed constant frequency wind turbine based on Internet of Things

In order to study the operating characteristics of variable speed constant frequency wind turbine under different working conditions and the monitoring system of wind turbine. In this paper, the simulation model of each component system of wind turbine ...

research-article
IoT device type identification using training deep quantum neural networks optimized with a chimp optimization algorithm for enhancing IoT security

IoT networks can be defined as groups of physically connected things and devices that can connect to the Internet and exchange data with one another. Since enabling an increasing number of internets of things devices to connect with their networks, ...

research-article
Multitier scalable clustering wireless network design approach using honey bee ratel optimization

Wireless sensor networks (WSNs) have emerged as a one of the most fascinating areas of lookup in the past few years principally due to its massive quantity of workable applications. However limited energy, node deployment strategy, routing techniques has ...

research-article
Transmit antenna selection in M-MIMO system using metaheuristic aided model

Massive MIMO (M-MIMO) devices are the key tool to meet the performance stards established for 5G-wireless communication. However, more Radio Frequency (RF) chains needed in base station (BS) with a huge count of transmitting antennas, involve expensive ...

research-article
Performance evaluation of six mesh router replacement methods for wireless mesh networks: A comparison study for small and middle scale networks considering two islands distribution of mesh clients

In this paper, we present a hybrid intelligent simulation system for optimization of mesh routers in Wireless Mesh Networks (WMNs) called WMN-PSOHCDGA. We implemented six mesh router replacement methods: CM, RIWM, LDIWM, LDVM, RDVM and FC-RDVM and ...

research-article
A novel framework of DDoS attack detection in network using hybrid heuristic deep learning approaches with attention mechanism

The “Distributed Denial of Service (DDoS)” threats have become a tool for the hackers, cyber swindlers, and cyber terrorists. Despite the high amount of conventional mitigation mechanisms that are present nowadays, the DDoS threats continue to enhance in ...

research-article
A comparison study of two implemented fuzzy-based models for decision of logical trust

In recent years, the human-to-human and human-to-things relationships are becoming complicated and unreliable, which makes harder decisions in a variety of situations. As a result, trust computing is gaining interest in a number of research fields. The ...

Comments