Analysis of machine learning based LEACH robust routing in the Edge Computing systems
暂无分享,去创建一个
Tripti Arjariya | Pratibhadevi Tapashetti | Lalit Garg | Vivek Parashar | Sangeeta | Vikram Rajpoot | M. Zahid Alam | Lalit Garg | Vikram Rajpoot | V. Parashar | Tripti Arjariya | Pratibhadevi Tapashetti | M. Alam
[1] Shuyu Jiang. LEACH Protocol Analysis and Optimization of Wireless Sensor Networks Based on PSO and AC , 2018, 2018 10th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC).
[2] Jean-Marie Bonnin,et al. Wireless sensor networks: a survey on recent developments and potential synergies , 2013, The Journal of Supercomputing.
[3] Anas Abu Taleb,et al. Review on LEACH Protocol , 2020, 2020 11th International Conference on Information and Communication Systems (ICICS).
[4] Timo Hämäläinen,et al. Requirements for Energy Efficient Edge Computing: A Survey , 2018, NEW2AN.
[5] H. Vincent Poor,et al. Distributed learning in wireless sensor networks , 2005, IEEE Signal Processing Magazine.
[6] Qi Han,et al. Journal of Network and Systems Management ( c ○ 2007) DOI: 10.1007/s10922-007-9062-0 A Survey of Fault Management in Wireless Sensor Networks , 2022 .
[7] Philippe Thomas. Review of Semi-supervised learning by O. Chapelle, B. Schölkopf, and A. Zien, Eds. London, UK, MIT Press, 2006 , 2009 .
[8] Princy A. Johnson,et al. An energy efficient and adaptive clustering for wireless sensor network (CH-leach) using leach protocol , 2017, 2017 13th International Computer Engineering Conference (ICENCO).
[9] Y.A. Sekercioglu,et al. Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.
[10] M. Kubát. An Introduction to Machine Learning , 2017, Springer International Publishing.
[11] Marimuthu Palaniswami,et al. Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Communications.
[12] Biswanath Mukherjee,et al. Wireless sensor network survey , 2008, Comput. Networks.
[13] Ran Wolff,et al. Noname manuscript No. (will be inserted by the editor) In-Network Outlier Detection in Wireless Sensor Networks , 2022 .
[14] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[15] Sateeshkrishna Dhuli,et al. A Hybrid Routing Protocol for Robust Wireless Sensor Networks , 2020, 2020 12th International Conference on Computational Intelligence and Communication Networks (CICN).
[16] Nirvana Meratnia,et al. Outlier Detection Techniques for Wireless Sensor Networks: A Survey , 2008, IEEE Communications Surveys & Tutorials.
[17] D. PraveenKumar,et al. Machine learning algorithms for wireless sensor networks: A survey , 2019, Inf. Fusion.
[18] Anna Förster,et al. Machine Learning across the WSN Layers , 2011 .
[19] Alex H. B. Duffy,et al. The "What" and "How" of Learning in Design , 1997, IEEE Expert.
[20] Mohammed Kaddi,et al. LEACH-KANG: A new routing protocol for WSN based on leach protocol and Kangaroo method , 2017, 2017 International Conference on Mathematics and Information Technology (ICMIT).
[21] Murad Khan,et al. Energy Efficient Hierarchical Clustering Approaches in Wireless Sensor Networks: A Survey , 2017, Wirel. Commun. Mob. Comput..
[22] Deborah Estrin,et al. The impact of data aggregation in wireless sensor networks , 2002, Proceedings 22nd International Conference on Distributed Computing Systems Workshops.
[23] Navdeep Kaur Saluja,et al. M-LEACH: A modified version of LEACH for WSNs , 2015 .
[24] Carlos León,et al. SIR: A New Wireless Sensor Network Routing Protocol Based on Artificial Intelligence , 2006, APWeb Workshops.
[25] Feng Xia,et al. From machine-to-machine communications towards cyber-physical systems , 2013, Comput. Sci. Inf. Syst..
[26] Herbert A. Simon,et al. Applications of machine learning and rule induction , 1995, CACM.
[27] Sana Hoor Jokhio,et al. Enhanced TL-LEACH routing protocol for large-scale WSN applications , 2019, 2019 Cybersecurity and Cyberforensics Conference (CCC).
[28] M. D. Vimalapriya,et al. Energy-Centric Route Planning using Machine Learning Algorithm for Data Intensive Secure Multi-Sink Sensor Networks , 2019, International Journal of Innovative Technology and Exploring Engineering.
[29] Victoria J. Hodge,et al. A Survey of Outlier Detection Methodologies , 2004, Artificial Intelligence Review.
[30] Kamaljot Singh,et al. WSN LEACH based protocols: A structural analysis , 2015, 2015 International Conference and Workshop on Computing and Communication (IEMCON).
[31] Amir Baghdadi. Application of Inertial Measurement Units for Advanced Safety Surveillance System Using Individualized Sensor Technology (ASSIST): A Data Fusion and Machine Learning Approach , 2018, 2018 IEEE International Conference on Healthcare Informatics (ICHI).
[32] Muhannad Quwaider,et al. LEACH Protocol Enhancement for Increasing WSN Lifetime , 2020, 2020 11th International Conference on Information and Communication Systems (ICICS).
[33] Er Meng Joo,et al. A survey of machine learning in Wireless Sensor netoworks From networking and application perspectives , 2007, 2007 6th International Conference on Information, Communications & Signal Processing.
[34] JAMAL N. AL-KARAKI,et al. Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.
[35] Ganesh K. Venayagamoorthy,et al. Computational Intelligence in Wireless Sensor Networks: A Survey , 2011, IEEE Communications Surveys & Tutorials.
[36] Giancarlo Fortino,et al. Lightweight Reinforcement Learning for Energy Efficient Communications in Wireless Sensor Networks , 2019, IEEE Access.
[37] Chinya V. Ravishankar,et al. LEACH-GA: Genetic Algorithm-BasedEnergy-Efficient Adaptive Clustering Protocolfor Wireless Sensor Networks , 2011 .
[38] Jing Gao,et al. DLRDG: distributed linear regression-based hierarchical data gathering framework in wireless sensor network , 2012, Neural Computing and Applications.
[39] Kay Römer,et al. The design space of wireless sensor networks , 2004, IEEE Wireless Communications.
[40] Tarachand Amgoth,et al. Parametric survey on cross-layer designs for wireless sensor networks , 2018, Comput. Sci. Rev..
[41] Leanna Vidya Yovita,et al. Energy Consumption and Packet Loss Analysis of LEACH Routing Protocol on WSN Over DTN , 2018, 2018 4th International Conference on Wireless and Telematics (ICWT).
[42] P. Sivakumar,et al. Performance Analysis of LEACH-GA over LEACH and LEACH-C in WSN , 2018 .
[43] Giancarlo Fortino,et al. A Simulation-driven Methodology for IoT Data Mining Based on Edge Computing , 2021, ACM Trans. Internet Techn..
[44] Pallavi Khatri,et al. Energy aware routing protocol over leach on wireless sensor network , 2016, 2016 International Conference on Computing, Communication and Automation (ICCCA).
[45] D. Janakiram,et al. Outlier Detection in Wireless Sensor Networks using Bayesian Belief Networks , 2006, 2006 1st International Conference on Communication Systems Software & Middleware.
[46] Suxia Xing,et al. Sausage Quality Classification of Hyperspectral Multi-Data Fusion Based on Machine Learning , 2019, 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS).