Zobrazeno 1 - 10
of 59
pro vyhledávání: '"Salaja Silas"'
Publikováno v:
IET Networks, Vol 13, Iss 4, Pp 301-312 (2024)
Abstract Industrial IoT (IIoT) applications are widely used in multiple use cases to automate the industrial environment. Industry 4.0 presents challenges in numerous areas, including heterogeneous data, efficient data sensing and collection, real‐
Externí odkaz:
https://doaj.org/article/93fc466559b8452780a41b4b7e9b8c58
Publikováno v:
IET Networks, Vol 13, Iss 2, Pp 147-164 (2024)
Abstract Conventional Mobile Communication Systems (MCS) reliably transfer critical messages from authorised remote information sources like military bases and ground control stations in the war field. As tactical advancement grows rapidly, the chall
Externí odkaz:
https://doaj.org/article/87dce73211e741149232b11b128b85ae
Autor:
Deva Priya Isravel, Salaja Silas, Jaspher Willsie Kathrine, Elijah Blessing Rajsingh, J. Andrew
Publikováno v:
IEEE Open Journal of the Communications Society, Vol 5, Pp 1537-1550 (2024)
The emerging 5G network has been revolutionizing the data transfer across the networks. Recently, advanced technologies transform the healthcare industry. With the emergence of 5G technology, smart and ubiquitous healthcare systems are interconnected
Externí odkaz:
https://doaj.org/article/2dd0d64697f84eccaeddcc99737fbea1
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 34, Iss 6, Pp 3685-3702 (2022)
The contemporary wireless sensor applications employ a Heterogeneous Wireless Sensor Network (HeWSN) to achieve its multi-objective missions. Modern wireless nodes constituting the HeWSN are more versatile in terms of its capabilities, functionalitie
Externí odkaz:
https://doaj.org/article/a6418be7c8024f85b94317d393623367
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 33, Iss 1, Pp 86-98 (2021)
Signcryption is an authenticated encryption technique that concurrently establishes message confidentiality, authenticity, integrity and non-repudiation. In this paper, we propose an efficient signcryption scheme, based on the hardness of RSA assumpt
Externí odkaz:
https://doaj.org/article/5bb812cca2924bd5a663ebb0476aa3ed
Publikováno v:
Journal of Ambient Intelligence and Humanized Computing.
Publikováno v:
Serbian Journal of Electrical Engineering. 19:207-224
Machine learning techniques enable computers to acquire intelligence through learning. Trained machines can carry out various tasks, such as prediction, classification, clustering, and recommendation, within a wide variety of applications. Classifica
Autor:
Immanuel Johnraja Jebadurai, Getzi Jeba Leelipushpam Paulraj, Jebaveerasingh Jebadurai, Salaja Silas
Publikováno v:
Artificial Intelligence and Blockchain in Digital Forensics ISBN: 9781003374671
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5e886ea7663877790dc3bfb2517411a4
https://doi.org/10.1201/9781003374671-7
https://doi.org/10.1201/9781003374671-7
Autor:
Anitha Christy Angelin, Salaja Silas
Wireless Sensor Networks (WSNs) have quite an exceptionally significant effect in diverse fields correlated to surveillance in which coverage plays an essential role. In specific, the coverage holes are actually instigated by both randomized distribu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::11fe9bf2bfb17c66b89afc186e7e678a
https://doi.org/10.21203/rs.3.rs-1412609/v1
https://doi.org/10.21203/rs.3.rs-1412609/v1
Publikováno v:
Arabian Journal for Science and Engineering. 45:10353-10380
The recent advancements in wireless communications, embedded processing and electronics have rendered wireless sensor networks (WSNs) an integral role in the development of smart environments and ubiquitous systems. In order to meet the ever-increasi