Results 91 to 100 of about 117,534 (254)

A Systematic Review of U‐Net Optimizations: Advancing Tumour Segmentation in Medical Imaging

open access: yesIET Image Processing, Volume 19, Issue 1, January/December 2025.
Since its introduction in 2015, U‐Net has become a foundational model for medical image segmentation, yet challenges remain in tumour segmentation due to heterogeneity and boundary ambiguity. This PRISMA‐based systematic review examines recent strategies aimed at enhancing U‐Net's performance for tumour segmentation in CT and MRI, focusing on backbone,
Omar Abueed   +2 more
wiley   +1 more source

MANET Routing Protocols Evaluation: AODV, DSR and DSDV Perspective

open access: yes, 2018
Mobile Ad Hoc Network (MANET) is a set of mobile nodes that communicate with each other to configure an immediate network without utilizing any of infrastructure, the centralized access point or centralized administration in multiple hop manner.
F. T. Al-Dhief   +4 more
semanticscholar   +1 more source

Secure Routing for MANET Connected Internet of Things Systems

open access: yesInternational Conference on Future Internet of Things and Cloud, 2018
This paper presents a contemporary review of communication architectures and topographies for MANET-connected Internet-of-Things (IoT) systems. Routing protocols for multi-hop MANETs are analyzed with a focus on the standardized Routing Protocol for Low ...
Jonny Karlsson, L. Dooley, G. Pulkkis
semanticscholar   +1 more source

Enhancing IoT Security via Federated Learning: A Comprehensive Approach to Intrusion Detection

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
The rapid proliferation of Internet of Things (IoT) devices has revolutionized various industries by enabling smart grids, smart cities, and other applications that rely on seamless connectivity and real‐time data processing. However, this growth has also introduced significant security challenges due to the scale, heterogeneity, and resource ...
Ye Bai   +6 more
wiley   +1 more source

METHODS ANALYSIS OF INTRUSION DETECTION IN MANET CLASS MOBILE RADIO NETWORKS

open access: yesSučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni, 2015
The analysis of existing methods of mobile radio networks intrusion detection was performed in the article and classification of intrusion detection methods was produced.
Serhii V. Salnyk   +2 more
doaj  

Improved QoS and avoidance of black hole attacks in MANET using trust detection framework

open access: yesAutomatika, 2019
In recent times, secured routing is a major research in MANETs. The behaviour of malicious nodes in this network increases the risk of threats and induces abnormal operations in MANETs.
J. Manoranjini   +2 more
semanticscholar   +1 more source

Multihop Intruder Node Detection Scheme (MINDS) for Secured Drones' FANET Communication

open access: yesIET Intelligent Transport Systems, Volume 19, Issue 1, January/December 2025.
The security of drone communication guarantees its safe mobility during operation. This work developed a robust connected intelligence security framework using a lightweight model that can detect and prevent all types of cyber‐attacks in drone networks in an efficient and cost‐effective manner.
Simeon Okechukwu Ajakwe   +2 more
wiley   +1 more source

Evaluación de desempeño de VoIP en redes MANET

open access: yesIteckne, 2014
MANET networks are an attractive option for VoIP solutions in scenarios that are characterized by the mobility of nodes and where there is not a previously established infrastructure.
Patricia Sing-Borrajo
doaj   +1 more source

SDVCA – A Robust and Secure Data Communication Protocol for Manet [PDF]

open access: gold, 2021
K. Anusha   +4 more
openalex   +1 more source

A Hybrid Algorithm for Improving the Quality of Service in MANET

open access: yesInternational Journal on Advanced Science, Engineering and Information Technology, 2018
A mobile ad-hoc network (MANET) exhibits a dynamic topology with flexible infrastructure. The MANET nodes may serve as both host and router functionalities.
M. H. Hassan   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy