Volume 13 , Issue 2 , PP: 25-34, 2024 | Cite this article as | XML | Html | PDF | Review Article
Julissa E. Reyna-Gonzalez DRA 1 * , N. K. Rayaguru 2 , Gowrishankar J. 3 , Bhargavi Gaurav Deshpande 4 , Madhur Grover 5 , Daxa Vekariya 6
Doi: https://doi.org/10.54216/JISIoT.130202
New Adaptive Nano-Scale Sensor Network (ANSN) can quickly feel nanoscale surroundings. ANSN uses data in many scenarios to improve networks, consume less energy, and gain more accurate data. ANSI essentials are covered in detail here. This group has numerous parts. Making service better, collecting data with less energy, sending data with Q-learning, merging sensor data to increase accuracy, controlling power dynamically, and protecting data using AES are examples. Energy collection and sensor use are key to this effort. Academic research has proven that ANSN outperforms other techniques in several areas. Improvements include speed, security, latency, sensor accuracy, and network stability. With these changes, ANSN may be suitable for small wireless sensor networks.
Adaptive Nano-Scale Sensor Network , Advanced Algorithms , Ant Colony Optimization , Data Accuracy , Data Aggregation , Dynamic Environmental Monitoring , Energy Consumption , Energy Harvesting , Nanoscale , Network Performance , Real-Time , Sensor Deployment , Sustainable Data Collection , Wireless Sensor Networks.
[1] J. Lopez, R. Roman, and C. Alcaraz, "Analysis of security threats, requirement, technologies and standards in wireless sensor networks," in Foundation of Security Analysis and Design V, Springer, Berlin, Germany, 2009, pp. 289-228. [Online]. Available: Google Scholar
[2] J. Li, L. Yu, J. Zhao, C. Luo, and J. Zheng, "TSTE: a time-variant stochastic trust evaluation model in social networks," KSII Transactions on Internet and Information Systems, vol. 11, no. 6, pp. 3273-3308, 2017. [Online]. Available: Google Scholar
[3] N. Battat, A. Makhoul, H. Kheddouci, S. Medjahed, and N. Aitouazzoug, "Trust based monitoring approach for mobile ad hoc networks," in Ad-Hoc, Mobile, and Wireless Networks, Springer, Cham, Switzerland, 2017, pp. 55-62. [Online]. Available: Google Scholar
[4] X. Wu, "A robust and adaptive trust management system for guaranteeing the availability in the internet of things environments," KSII Transactions on Internet and Information Systems, vol. 12, no. 5, pp. 2396-2413, 2018. [Online]. Available: Google Scholar
[5] R. Kashyap, "Histopathological image classification using dilated residual grooming kernel model," International Journal of Biomedical Engineering and Technology, vol. 41, no. 3, p. 272, 2023. [Online]. Available: https://doi.org/10.1504/ijbet.2023.129819
[6] J. Kotwal, Dr. R. Kashyap, and Dr. S. Pathan, "Agricultural plant diseases identification: From traditional approach to deep learning," Materials Today: Proceedings, vol. 80, pp. 344–356, 2023. [Online]. Available: https://doi.org/10.1016/j.matpr.2023.02.370
[7] Edwin Ramirez-Asis, Romel Percy Melgarejo Bolivar, Leonid Alemán Gonzales, Sushovan Chaudhury, Ramgopal Kashyap, Walaa F. Alsanie, G. K. Viju, "A Lightweight Hybrid Dilated Ghost Model-Based Approach for the Prognosis of Breast Cancer," Computational Intelligence and Neuroscience, vol. 2022, Article ID 9325452, 10 pages, 2022. [Online]. Available: https://doi.org/10.1155/2022/9325452
[8] M. S. Abdalzaher and O. Muta, "Employing game theory and TDMA protocol to enhance security and manage power consumption in WSNs-based cognitive radio," IEEE Access, vol. 7, pp. 132923-132936, 2019. [Online]. Available: Publisher Site
[9] A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," Computer, vol. 35, no. 10, pp. 54-62, 2002. [Online]. Available: Publisher Site
[10] A. A. Pirzada and C. McDonald, "Establishing trust in pure ad-hoc networks," in Proceedings of the 27th Australasian Conference on Computer Science, vol. 26, pp. 47-54, Dunedin, New Zealand, January, 2004. [Online]. Available: Google Scholar
[11] Anjali Raghav , Monika Gupta, Ensemble Learning for Facial Expression Recognition, Fusion: Practice and Applications, Vol. 2 , No. 1 , (2020) : 31-41 (Doi : https://doi.org/10.54216/FPA.020104)
[12] S Hariharan , Monika Gupta, Improving Cloud-based ECG Monitoring, Detection and Classification using GAN, Fusion: Practice and Applications, Vol. 2 , No. 2 , (2020) : 42-49 (Doi: https://doi.org/10.54216/FPA.020201)
[13] E. C. H. Ngai and M. R. Lyu, "Trust and clustering based authentication services in mobile ad hoc networks," in Proceedings of the 24th International Conference on Distributed Computing Systems Workshops, Tokyo, Japan, March 2004, pp. 582-587. [Online]. Available: Google Scholar
[14] Y. Zhou, Y. Fang, and Y. Zhang, "Securing wireless sensor networks: a survey," IEEE Communications Surveys & Tutorials, vol. 10, no. 3, pp. 6-28, 2008. [Online]. Available: Publisher Site
[15] V. Roy et al., “Detection of sleep apnea through heart rate signal using Convolutional Neural Network,” International Journal of Pharmaceutical Research, vol. 12, no. 4, pp. 4829-4836, Oct-Dec 2020.
[16] Irina V. Pustokhina, Blockchain technology in the international supply chains, International Journal of Wireless and Ad Hoc Communication, Vol. 1 , No. 1 , (2020) : 16-25 (Doi : https://doi.org/10.54216/IJWAC.010103)
[17] R.Pandi Selvam, Performance of MAODV and ODMRP Routing Protocol for Group Communication in Mobile Ad Hoc Network, International Journal of Wireless and Ad Hoc Communication, Vol. 1 , No. 1 , (2020) : 26-32 (Doi : https://doi.org/10.54216/IJWAC.010104)
[18] Vinodkumar Mohanakurup, Syam Machinathu Parambil Gangadharan, Pallavi Goel, Devvret Verma, Sameer Alshehri, Ramgopal Kashyap, Baitullah Malakhil, "Breast Cancer Detection on Histopathological Images Using a Composite Dilated Backbone Network," Computational Intelligence and Neuroscience, vol. 2022, Article ID 8517706, 10 pages, 2022. [Online]. Available: https://doi.org/10.1155/2022/8517706
[19] J. Cheng, J. Li, N. Xiong, M. Chen, H. Guo, and X. Yao, "Lightweight mobile clients privacy protection using trusted execution environments for blockchain," Computers, Materials & Continua, vol. 65, no. 3, pp. 2247-2262, 2020. [Online]. Available: Publisher Site
[20] S. Kaur and V. K. Joshi, "Hybrid soft computing technique based trust evaluation protocol for wireless sensor networks," Intelligent Automation & Soft Computing, vol. 26, no. 2, pp. 217-226, 2020. [Online]. Available: Google Scholar
[21] L. Sun, Q. Yu, D. Peng, S. Subramani, and X. Wang, "Fogmed: a fog-based framework for disease prognosis based medical sensor data streams," Computers, Materials & Continua, vol. 66, no. 1, pp. 603-619, 2020. [Online]. Available: Publisher Site
[22] Esraa Mohamed, The Relationship between Artificial Intelligence and Internet of Things: A quick review, Journal of Cybersecurity and Information Management, Vol. 1 , No. 1 , (2020) : 30-34 (Doi : https://doi.org/10.54216/JCIM.010101)
[23] Dr. Ajay B. Gadicha , Dr. Vijay B. Gadicha, Implicit Authentication Approach by Generating Strong Password through Visual Key Cryptography, Journal of Cybersecurity and Information Management, Vol. 1 , No. 1 , (2020) : 5-16 (Doi : https://doi.org/10.54216/JCIM.010102)
[24] Vandana Roy, Shailja Shukla, “Effective EEG Motion artifacts Removal with KS test Blind Source Separation and Wavelet Transform”, International Journal of Bio-Science and Bio-Technology, 2016, Vol. 8, No. 5, 2016, pp. 139-154, DOI:10.14257/ijbsbt.2016.8.5.13.
[25] S. Stalin, V. Roy, P. K. Shukla, A. Zaguia, M. M. Khan, P. K. Shukla, A. Jain, "A Machine Learning-Based Big EEG Data Artifact Detection and Wavelet-Based Removal: An Empirical Approach," Mathematical Problems in Engineering, vol. 2021, Article ID 2942808, 11 pages, 2021. [Online]. Available: https://doi.org/10.1155/2021/2942808
[26] Gajender Kumar, Vinod Patidar, Prolay Biswas, Mukta Patel, Chaur Singh Rajput, Anita Venugopal, Aditi Sharma, IOT enabled Intelligent featured imaging Bone Fractured Detection System, Journal of Intelligent Systems and Internet of Things, Vol. 9 , No. 2 , (2023) : 08-22 (Doi : https://doi.org/10.54216/JISIoT.090201)
[27] Alber S. Aziz, Moahmed Emad, Mahmoud Ismail, Heba Rashad, Ahmed M. Ali, Ahmed Abdelhafeez, Shimaa S. Mohamed, An Intelligent Multi-Criteria Decision-Making Model for selecting an optimal location for a data center: Case Study in Egypt, Journal of Intelligent Systems and Internet of Things, Vol. 9 , No. 2 , (2023) : 23-35 (Doi : https://doi.org/10.54216/JISIoT.090202)
[28] N. Poolsappasit, M. Busby, and S. K. Madria, "Trust management of encrypted data aggregation in a sensor network environment," in Proceedings of the IEEE 13th International Conference on Mobile Data Management, Bengaluru, India, November 2012, pp. 157-166. [Online]. Available: Google Scholar
[29]. Rabie A. Ramadan, An Improved Group Teaching Optimization based Localization Scheme for WSN, International Journal of Wireless and Ad Hoc Communication, Vol. 3 , No. 1 , (2021) : 08-16 (Doi: https://doi.org/10.54216/IJWAC.030101)
[30]. Mahmoud A. Zaher , Mohmaed A. Labib, Artificial Flora Optimization Algorithm with Functional Link Neural Network for DoS Attack Classification in WSN, International Journal of Wireless and Ad Hoc Communication, Vol. 4 , No. 1 , (2022) : 08-18 (Doi : https://doi.org/10.54216/IJWAC.040101).