2021
DOI: 10.1016/j.matpr.2021.01.241
|View full text |Cite|
|
Sign up to set email alerts
|

WITHDRAWN: An efficient biometric based authenticated geographic opportunistic routing for IoT applications using secure wireless sensor network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…Using a balanced distribution of weak and hard data, which makes the data set, difficult instances are identified by out-of-bag handlers, so that when a sample is considered "hard" it is incorrectly classified by the ensemble. This hard data is always added to the next data set while easy data has little chance of getting into the dataset [20,[81][82][83]. Performance of the Bagging based hybrid models developed in this study is slightly better than other ML models such as LASSO (R2 = 0.911), Random Forest (R2 = 0.936) and SVM (R2 = 0.935) carried out by Nguyen et al [13] on Mekong River.…”
Section: Resultsmentioning
confidence: 75%
“…Using a balanced distribution of weak and hard data, which makes the data set, difficult instances are identified by out-of-bag handlers, so that when a sample is considered "hard" it is incorrectly classified by the ensemble. This hard data is always added to the next data set while easy data has little chance of getting into the dataset [20,[81][82][83]. Performance of the Bagging based hybrid models developed in this study is slightly better than other ML models such as LASSO (R2 = 0.911), Random Forest (R2 = 0.936) and SVM (R2 = 0.935) carried out by Nguyen et al [13] on Mekong River.…”
Section: Resultsmentioning
confidence: 75%
“…Menaga et al [24] highlights about different routing protocols and simulation techniques for determining the ideal routing protocol. AODV and DSDV are investigated, with DSDV emerging as the best option for this simulation Network Simulator.…”
Section: Review Of Location-based Geographic Routing Protocolsmentioning
confidence: 99%
“…Because of the non-contact nature of the FKP collection [73], users are more likely to accept it [74]. As such, FKP is regarded as one of the most feasible and effective personal identification technologies in the future [75][76][77][78][79].…”
Section: Introductionmentioning
confidence: 99%