2023
DOI: 10.21123/bsj.2023.7161
|View full text |Cite
|
Sign up to set email alerts
|

Impacts of Denial-of-Service Attack on Energy Efficiency Pulse Coupled Oscillator

Abstract: The Pulse Coupled Oscillator (PCO) has attracted substantial attention and widely used in wireless sensor networks (WSNs), where it utilizes firefly synchronization to attract mating partners, similar to artificial occurrences that mimic natural phenomena. However, the PCO model might not be applicable for simultaneous transmission and data reception because of energy constraints. Thus, an energy-efficient pulse coupled oscillator (EEPCO) has been proposed, which employs the self-organizing method by combining… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 19 publications
0
2
0
Order By: Relevance
“…This includes turning up mobile devices and test instruments in real-world settings and comparing the actual signal quality and strength with the values estimated by the simulation algorithms. These evaluations offer valuable information that can be used to improve network efficiency and modify coverage models [31][32][33][34][35][36][37][38][39][40][41].…”
Section: Coverage Radio Signal Calculation For 6g Networkmentioning
confidence: 99%
“…This includes turning up mobile devices and test instruments in real-world settings and comparing the actual signal quality and strength with the values estimated by the simulation algorithms. These evaluations offer valuable information that can be used to improve network efficiency and modify coverage models [31][32][33][34][35][36][37][38][39][40][41].…”
Section: Coverage Radio Signal Calculation For 6g Networkmentioning
confidence: 99%
“…Based on various types of data that affect the overall detection and classification performance, ML approaches such as Support Vector Machine (SVM), Naive Bayes (NB), Decision Trees (DT), etc., were utilized to locate risky applications for modelling purposes (Gardiner & Nagaraja, 2016;Muhamed, 2022;Hassan et al, 2023).…”
Section: Literature Reviewmentioning
confidence: 99%