• All Solutions All Solutions Caret
    • Editage

      One platform for all researcher needs

    • Paperpal

      AI-powered academic writing assistant

    • R Discovery

      Your #1 AI companion for literature search

    • Mind the Graph

      AI tool for graphics, illustrations, and artwork

    • Journal finder

      AI-powered journal recommender

    Unlock unlimited use of all AI tools with the Editage Plus membership.

    Explore Editage Plus
  • Support All Solutions Support
    discovery@researcher.life
Discovery Logo
Sign In
Paper
Search Paper
Cancel
Pricing Sign In
  • My Feed iconMy Feed
  • Search Papers iconSearch Papers
  • Library iconLibrary
  • Explore iconExplore
  • Ask R Discovery iconAsk R Discovery Star Left icon
  • Chat PDF iconChat PDF Star Left icon
  • Chrome Extension iconChrome Extension
    External link
  • Use on ChatGPT iconUse on ChatGPT
    External link
  • iOS App iconiOS App
    External link
  • Android App iconAndroid App
    External link
  • Contact Us iconContact Us
    External link
Discovery Logo menuClose menu
  • My Feed iconMy Feed
  • Search Papers iconSearch Papers
  • Library iconLibrary
  • Explore iconExplore
  • Ask R Discovery iconAsk R Discovery Star Left icon
  • Chat PDF iconChat PDF Star Left icon
  • Chrome Extension iconChrome Extension
    External link
  • Use on ChatGPT iconUse on ChatGPT
    External link
  • iOS App iconiOS App
    External link
  • Android App iconAndroid App
    External link
  • Contact Us iconContact Us
    External link

Node Deployment Research Articles (Page 1)

  • Share Topic
  • Share on Facebook
  • Share on Twitter
  • Share on Mail
  • Share on SimilarCopy to clipboard
Follow Topic R Discovery
By following a topic, you will receive articles in your feed and get email alerts on round-ups.
Overview
1342 Articles

Published in last 50 years

Related Topics

  • Underwater Wireless Sensor Networks
  • Underwater Wireless Sensor Networks
  • Random Deployment
  • Random Deployment
  • Sensor Deployment
  • Sensor Deployment
  • Node Placement
  • Node Placement

Articles published on Node Deployment

Authors
Select Authors
Journals
Select Journals
Duration
Select Duration
1318 Search results
Sort by
Recency
  • Research Article
  • 10.1088/1402-4896/ae06d5
Multi-objective optimization for node deployment of 3D curved surface wireless sensor networks
  • Sep 1, 2025
  • Physica Scripta
  • Kun Wang + 5 more

Abstract In researching wireless sensor networks (WSNs), node deployment for three-dimensional (3D) curved scenarios is challenging. This study aims to develop a node deployment strategy for 3D curved surface WSNs with high coverage, good connectivity, low energy consumption, and long lifespan. Firstly, a 3D curved surface (mountain) model and a sensing model with the attenuation of perception ability when encountering obstacles are established. Secondly, a joint deployment scheme for sensor and relay nodes is proposed to reduce the likelihood of energy-hole occurrence and the complexity of the entire network deployment. A multi-objective node deployment (MOND) model with connectivity ratio as a constraint and maximum coverage and minimum energy consumption as optimization objectives are constructed. Finally, to address this MOND problem, this article proposes two algorithms based on Pareto optimal and hunter-prey optimization: Multi-objective Hunter-Prey Optimization Algorithm (MOHPO) and Multi-objective Hunter-Prey Optimization Algorithm with Fuzzy C-Means Clustering (MOHPO/FCM). Simulation experiments were conducted in both multi-peak and multi-depression terrain scenarios to evaluate the node deployment performance of the proposed algorithm. Simulation results show that MOHPO and MOHPO/FCM exhibit superior performance in improving network coverage, enhancing connectivity, reducing energy consumption, and extending network lifespan compared to the comparison algorithms.

  • Research Article
  • 10.1088/2631-8695/adfbcf
Dynamic deployment of mobile sensor nodes to optimize barrier coverage
  • Aug 28, 2025
  • Engineering Research Express
  • Himansu Bhushan Mohapatra + 1 more

Dynamic deployment of mobile sensor nodes to optimize barrier coverage

  • Research Article
  • 10.1038/s41598-025-14252-0
Efficient node deployment for enhancing coverage and connectivity in Wireless Sensor Networks
  • Aug 8, 2025
  • Scientific Reports
  • Rahul Priyadarshi

Efficient deployment of Wireless Sensor Networks (WSNs) is critical to ensuring optimal performance across key metrics such as coverage, connectivity, energy efficiency, and network longevity. Traditional deployment strategies such as random, grid-based, and deterministic placements often fail to accommodate heterogeneous node capabilities or adapt to dynamic environmental conditions. This study proposes a Particle Swarm Optimization (PSO)-based deployment framework tailored for heterogeneous WSNs. The framework incorporates intelligent role assignment, metaheuristic optimization, and adaptive maintenance phases to balance coverage quality, minimize energy consumption, and enhance fault tolerance. A comprehensive simulation-based evaluation involving nine deployment strategies demonstrates that the proposed PSO-based approach achieves superior performance, including an average coverage of 91.4 ± 1.8%, extended operational lifetime exceeding 3,400 rounds, and improved connectivity robustness. The framework also exhibits strong scalability and resilience in the presence of node failures. These findings establish the proposed deployment model as a viable solution for real-world, large-scale, and energy-constrained WSN applications.

  • Research Article
  • 10.1609/aaaiss.v6i1.36043
I-TREES: A Context-Aware Framework for Energy-Efficient Tree Health Monitoring in Forest Internet of Trees (IoTr) Networks
  • Aug 1, 2025
  • Proceedings of the AAAI Symposium Series
  • Zanab Safdar + 5 more

Internet of Trees (IoTr) technology enables a novel approach to real-time remote monitoring, particularly of trees and forest ecosystems. However, existing literature focuses on soil moisture monitoring of trees and lacks the contextual intelligence and adaptive sensing capabilities necessary for smart tree monitoring. This paper proposes a novel layered architecture for IoTr and the I-TREES (IoTr-based Tree Routing for Energy-Efficient Systems) framework for smart sensing and context-driven monitoring. I-TREES integrates embedded IoTr environmental sensors, LPWAN communication, edge processing, and cloud-based reasoning to monitor physiological and ecological stress parameters in vulnerable tree species. The proposed architecture enables selective sensing, where sensors adapt their behaviour based on real time environmental conditions to reduce energy consumption and avoid redundant transmissions. We evaluate I-TREES using Network Simulator 3 (NS-3) simulations across 700 node deployments under forest-like conditions and compare them with benchmark routing protocols. Results show that I-TREES achieves a superior packet delivery ratio approximately 97%, reduced latency, and lower energy consumption than existing schemes. I-TREES offers a robust solution for sustainable forest ecosystem monitoring and early disease detection by combining scalable sensing with intelligent context awareness.

  • Research Article
  • 10.3390/fi17080344
Cross-Layer Controller Tasking Scheme Using Deep Graph Learning for Edge-Controlled Industrial Internet of Things (IIoT)
  • Jul 30, 2025
  • Future Internet
  • Abdullah Mohammed Alharthi + 4 more

Edge computing (EC) plays a critical role in advancing the next-generation Industrial Internet of Things (IIoT) by enhancing production, maintenance, and operational outcomes across heterogeneous network boundaries. This study builds upon EC intelligence and integrates graph-based learning to propose a Cross-Layer Controller Tasking Scheme (CLCTS). The scheme operates through two primary phases: task grouping assignment and cross-layer control. In the first phase, controller nodes executing similar tasks are grouped based on task timing to achieve monotonic and synchronized completions. The second phase governs controller re-tasking both within and across these groups. Graph structures connect the groups to facilitate concurrent tasking and completion. A learning model is trained on inverse outcomes from the first phase to mitigate task acceptance errors (TAEs), while the second phase focuses on task migration learning to reduce task prolongation. Edge nodes interlink the groups and synchronize tasking, migration, and re-tasking operations across IIoT layers within unified completion periods. Departing from simulation-based approaches, this study presents a fully implemented framework that combines learning-driven scheduling with coordinated cross-layer control. The proposed CLCTS achieves an 8.67% reduction in overhead, a 7.36% decrease in task processing time, and a 17.41% reduction in TAEs while enhancing the completion ratio by 13.19% under maximum edge node deployment.

  • Research Article
  • 10.1038/s41598-025-09033-8
Vehicles detection through wireless sensors networks and optical fiber sensors.
  • Jul 25, 2025
  • Scientific reports
  • Hacen Khlaifi + 2 more

Due to the evolving variations in government and political systems both domestically and internationally, along with the imposition of high tariffs at borders, these borders have become vulnerable points for terrorism and smuggling activities. Consequently, each country endeavors to develop its own protection systems, with the technologies employed varying depending on the severity and significance of the installations to be safeguarded. While some of these technologies are costly and redundant, others offer effective and adaptable levels of efficiency. Therefore, designing a surveillance system capable of monitoring and controlling access has become essential. In this context, the present work holds significant strategic and geopolitical importance. It integrates established alarm and monitoring methods with innovative Internet of Things (IoT) applications, including Wireless Sensor Networks (WSN) and Optical Fiber Sensors (OFS). This article introduces the deployment of wireless radar nodes in conjunction with Bragg fiber sensors to identify each approaching intruding vehicle in the monitored zone, enabling the determination of its speed, weight, and wheelbase distance. Our system's results demonstrated acceptable levels of intruder detection and classification. We verify that the wavelength-based pressure detection error rate is small, approximately 0.05kg/cm2. The wheelbase distance estimate had an error rate of around 0.012m, while the weight calculation from the pressure had an error rate of about 12kg. This value is negligible and cannot skew the outcome. In our case, we apply WSN, radar and optical fiber sensors to detect vehicles in the border area. However, several works in literature.

  • Research Article
  • 10.46632/jemm/8/2/11
Enhancing Security in WSN Using Optimization Algorithm
  • Jul 21, 2025
  • REST Journal on Emerging trends in Modelling and Manufacturing

Wireless sensor networks (WSNs) are becoming more prevalent in a wide range of uses, including tracking the environment, medical care, and military monitoring. Yet, security, energy efficiency, and overall efficiency are important concerns for these networks. Ensuring the security of data transmission while maintaining energy efficiency is critical for the longevity and reliability of WSNs. This paper proposes a novel method to enhance both security and efficiency in WSNs done the integration of metaheuristic optimization algorithms. The proposed method leverages advanced optimization techniques such as Genetic Algorithms (GA), Particle Swarm Optimization (PSO), and Ant Colony Optimization (ACO) to dynamically optimize key parameters, including node deployment, routing protocols, and encryption schemes. By optimizing the network topology, routing paths, and energy consumption strategies, the algorithm significantly improves data security, minimizes energy usage, and enhances network lifespan. The simulation results show that the suggested methodology beats standard methods in terms of throughput, security resilience and energy efficiency. The findings highlight the potential of metaheuristic optimization algorithms as a robust tool for improving WSN security and operational efficiency in real-world applications

  • Research Article
  • 10.1186/s42162-025-00553-1
Energy optimization in intelligent sensor networks: application of particle swarm optimization algorithm in the deployment of electronic information sensing nodes
  • Jul 13, 2025
  • Energy Informatics
  • Wang Liang

Positioning, coverage, and energy efficiency are essential for developing next-generation intelligent sensor networks. In wireless sensor networks (WSNs), the random deployment of sensor nodes (SNs) frequently results in suboptimal area coverage and excessive energy consumption, primarily due to overlapping sensing regions and redundant data transmissions. This research presents a Particle Swarm Optimization (PSO) algorithm to optimize the deployment of electronic information sensing nodes. The focus is on maximizing the monitored area while minimizing energy usage. A Scalable coverage-based particle swarm optimization (SCPSO) algorithm integrates a probabilistic coverage model based on Euclidean distance to detect coverage gaps and guide the optimal positioning of nodes, ensuring that each target within the region of interest is covered by at least one sensor. Data preprocessing, including Z-score normalization and Independent Component Analysis (ICA), ensures feature scaling and dimensionality reduction for improved model performance, enabling effective optimization. Experimental results under different key metrics included coverage rate (CR) for various numbers of nodes (0.9971) with 50 nodes, deployment (99.95%) with the best coverage, and computation time (0.008s), indicating significant performance improvements under optimized deployment configurations. These results highlight the effectiveness of swarm intelligence methods in enabling energy-efficient, performance-optimized deployment of electronic information sensing systems in intelligent WSNs.

  • Research Article
  • 10.1038/s41598-025-09849-4
Coverage optimization and node minimization in WSNs: an enhanced hybrid PSO approach with spatial position encoding
  • Jul 13, 2025
  • Scientific Reports
  • Yinghua Tong + 5 more

Wireless sensor networks (WSNs) are widely used in various applications requiring efficient coverage and minimal resource utilization. This paper presents an enhanced hybrid particle swarm optimization (EHPSO) algorithm that incorporates a spatial position encoding (SPE) strategy to optimize coverage while dynamically adjusting the number of sensors deployed in WSNs. The proposed approach leverages the strengths of particle swarm optimization (PSO) by integrating it with the SPE mechanism, which effectively guides the search process towards high-quality solutions. The EHPSO algorithm is designed to balance exploration and exploitation capabilities, enabling dynamic node adjustment and ensuring robust performance across different network configurations and environmental conditions. Extensive simulations are conducted to evaluate the performance of the proposed method against state-of-the-art algorithms in terms of coverage quality and node count. A multi-objective optimization model is also established, further illustrating the algorithm’s performance and its effectiveness in balancing the number of sensors and coverage rate. Results demonstrate improvements in coverage optimization and reduction of node deployment compared to existing methods. This research contributes to more efficient and cost-effective deployment strategies for WSNs, particularly in scenarios where resources are limited and optimal coverage is critical.

  • Research Article
  • 10.24425/ijet.2025.155451
Lightweight and scalable security for wireless IoT systems: challenges and research directions
  • Jul 11, 2025
  • International Journal of Electronics and Telecommunications
  • Daniel Migwi + 1 more

The rise of Wireless Sensor Networks (WSN) has redefined the modern digital infrastructure by enabling real-time sensing, decision making, and automation across diverse sectors. However, this rapid evolution has introduced unprecedented security challenges due to constrained computational resources, heterogeneous device environments, and wide-scale deployment of IoT nodes. This research provides a comprehensive review of lightweight and scalable security mechanisms tailored for wireless IoT systems, with a focus on practical deployment realities. It begins by outlining the security requirements and architectural constraints specific to IoT devices and then evaluates the security capabilities and vulnerabilities of commonly used wireless communication protocols. Emphasis is placed on the limitations of current implementations and protocol-level security inconsistencies. To address these gaps, the paper explores lightweight cryptographic techniques, particularly the NISTapproved Ascon algorithm suite, assessing its adaptability to resource-constrained environments. The discussion extends into scalable key management mechanisms and then investigates the challenges of large-scale deployment. It concludes by identifying future research areas that integrates security within broader system goals.

  • Research Article
  • 10.48175/ijarsct-28480
EAMLOF: An Energy-Aware Multi-Layer Optimization Framework for Battery-Operated IoT Devices in Smart Environments
  • Jul 9, 2025
  • International Journal of Advanced Research in Science, Communication and Technology
  • Kiran Maraiya + 1 more

The exponential growth of Internet of Things (IoT) ecosystems has resulted in a vast deployment of battery-powered sensor nodes across diverse application domains, including healthcare, smart cities, agriculture, and environmental monitoring. These devices often operate in energy-constrained and inaccessible settings, where battery replacement or maintenance is impractical. Addressing this critical challenge, this paper introduces EAMLOF (Energy-Aware Multi-Layer Optimization Framework), a novel cross-layer framework designed to optimize energy utilization in battery-powered IoT networks. Unlike conventional protocols such as PEGASIS and APTEEN, which offer limited adaptability, EAMLOF integrates adaptive sleep/wake scheduling, intelligent data filtering, energy-aware routing, and context-sensitive sampling. The framework employs lightweight edge intelligence to assess node energy levels, data variability, and environmental conditions, enabling dynamic adjustment of communication strategies. This significantly reduces redundant transmissions and energy waste. Simulation results conducted on a network of 1000 nodes using the First-Order Radio Model demonstrate that EAMLOF consistently outperforms existing benchmarks in terms of energy efficiency, network lifetime, packet delivery, and node survivability, showcasing its suitability for long-term and large-scale deployments. EAMLOF presents a scalable, intelligent, and sustainable approach to energy conservation in IoT systems, contributing to the realization of robust, green, and autonomous smart environments.

  • Research Article
  • 10.1002/dac.70162
Fuzzy‐Driven Cluster Head Selection and Deep Learning Prediction on the Basis of Hybrid Optimization Algorithm for Multiobjective Routing in WSN‐IoT
  • Jul 7, 2025
  • International Journal of Communication Systems
  • R Ramya + 1 more

ABSTRACTIn the Internet of things–aided wireless sensor networks, the deployment of several nodes on a large scale presents distinctive complexities different from conventional WSNs, which leads to varied issues and challenges. Generally, the sensor nodes operate on restricted energy resources, and they play a vital role in the networks. Designing a protocol that is both resilient and energy efficient to enhance the network's prolonged existence poses an important issue. Thus, a novel metaheuristic optimization algorithm is introduced in this paper, which is aimed at addressing cluster head selection and routing in IoT‐based WSNs. Generally, selecting cluster heads is considered essential for enhancing the performance of clustering routing protocols. To address this, a novel approach for optimization called the Artificial Hummingbird Cheetah Optimizer Algorithm is presented, which is the combination of both the Artificial Hummingbird and Cheetah Optimizer Algorithm. Additionally, multiobjective prediction is conducted by employing a convolutional neural network model, which is trained with a cat‐and‐mouse optimizer model. Then, CHS is performed using a fuzzy system, by considering predicted energy levels, lifetime of the sensor nodes, trust, and quality of service. Routing is next executed by employing the AHbCOA model. Finally, an experimentation analysis is performed by evaluating the performance of the presented approach with several optimization models. The performance of these approaches is evaluated by employing various metrics such as energy consumption, throughput, QoS, trust, and LLT. The overall analysis reveals that the proposed model outperforms others, achieving values of 0.933 (J) for energy, 0.592 (s) for LLT, 0.938 for trust, 0.791 (Mbps) for QoS, and 0.934 (kbps) for throughput.

  • Research Article
  • 10.47392/irjaeh.2025.0455
Underwater Acoustic Sensor Networks for Secure Communication
  • Jul 5, 2025
  • International Research Journal on Advanced Engineering Hub (IRJAEH)
  • Mr Ravindra P Dhongadi + 1 more

Underwater Acoustic Sensor Networks (UASNs) are gaining increasing interest from researchers due to their promising applications in areas like oil spill monitoring, maritime surveillance, deep-sea archaeology, and marine environment monitoring. With approximately 70% of the Earth's surface covered by water, accessing valuable data from the seafloor is challenging without the aid of specialized technology. Sensor nodes are used in UWSNs to monitor the underwater environment. Once data is collected, it is sent to a sink node, which forwards it to a base station for additional processing. However, sensor node deployment in UWSNs is challenging due to the harsh underwater circumstances, and issues like high energy consumption and restricted communication range make data routing more complicated. UASNs are vulnerable to attacks from malicious nodes, including wormhole, black hole, and Sybil attacks. Lightweight cryptography, which focuses on algorithms that consume less memory, processing power, and energy, is ideal for resource-constrained devices like smartphones, sensors, and IoT devices. One such method that has been used is the Hénon map, a chaotic system, which is particularly useful for text and image encryption. It offers a balance between security and resource efficiency by generating random sequences that drive encryption techniques on devices with limited processing power.

  • Research Article
  • 10.52088/ijesty.v5i3.1127
Swarm Intelligence-Based Performance Optimization for Wireless Sensor Networks for Hole Detection
  • Jul 3, 2025
  • International Journal of Engineering, Science and Information Technology
  • T Padmapriya + 4 more

Extensive research into maintaining coverage over time has been spurred by the growing need for wireless sensor networks to monitor certain regions. Coverage gaps brought on either haphazard node placement or failures pose the biggest threat to this objective. In order to identify and fix coverage gaps, this study suggests an algorithm based on swarm intelligence. Using both local and relative information, the swarm of agents navigates a potential field toward the nearest hole and activates in reaction to holes found. In order to spread out effectively and speed up healing, the agents quantize their perceptions and approach holes from various angles. The need for wireless sensor networks to monitor certain areas has grown, leading to many studies on maintaining coverage over time. Random node deployment or failures create coverage gaps, which pose the biggest threat to this objective. A swarm intelligence-based approach is proposed in this paper to identify and fix coverage deficiencies. Even with Their encouraging performance and operational quality, WSNs are susceptible to various security threats. The security of WSNs is seriously threatened by sinkhole attacks, one of these. In this research, a detection strategy against sinkhole attacks is proposed and developed using the Swarm Intelligence (SI) optimization algorithm. MATLAB has been used to implement the proposed work, and comprehensive Models have been run to assess its effectiveness in terms of energy consumption, packet overhead, convergence speed, detection accuracy, and detection time. The findings demonstrate that the mechanism we have suggested is effective and reliable in identifying sinkhole attacks with a high rate of detection accuracy.

  • Research Article
  • 10.1029/2024rs008145
DYNACLUSTERNET: A Dynamic Clustering Network‐Based Routing Optimization for Edge Computing
  • Jun 28, 2025
  • Radio Science
  • Ravula Rajesh + 2 more

Abstract The Internet of Things has led to a surge in data generation and network complexity, especially in edge environments with dynamic topologies and moving objects. Traditional clustering methods in edge computing often fail to address these challenges, such as efficient data aggregation and computational management. DynaClusterNet, a novel framework, introduces three protocols: Adaptive Cluster‐Based Deployment Protocol (ACDP), Dynamic Algae Spider Protocol (DASP), and Deep Q Routing Protocol (DQRP). The ACDP uses Voronoi diagrams for optimal node deployment and cluster formation, while the DASP uses Artificial Algae and Black Widow Algorithms to dynamically select cluster heads and optimize data transmission. The DQRP uses deep reinforcement learning to determine efficient routing paths, adapting to environmental changes, node mobility, and evolving network topologies. DynaClusterNet significantly outperforms existing protocols in terms of end‐to‐end delay, energy consumption, and Packet Delivery Ratio. It ensures a robust, efficient, and adaptable network performance with a minimal end‐to‐end delay of approximately 0.05 s and significantly lower energy consumption profile than competing protocols.

  • Research Article
  • 10.1002/dac.70153
An Efficient Location Signature Generation‐Based Localization Framework Using Flog Algorithm in Wireless Sensor Networks
  • Jun 24, 2025
  • International Journal of Communication Systems
  • Vijendra Kumar Dandamudi + 1 more

ABSTRACTIn Wireless Sensor Networks (WSNs), localization is extensively wielded for determining the current location of the Sensor Nodes (SNs). But, localization is a challenging task. The localization problems in WSN can be addressed by the existing localization algorithms with the consequences of cost, size, as well as energy problems only. Thus, an efficient location signature generation framework is presented by using the Flexible Ligands Oriented on Grid (FLOG) localization algorithm in WSN. Primarily, the regions are identified and the nodes are randomly deployed. Then, the signal strength is collected. The sensor field is divided into equal triangles in which edge set, vertex set, and coverage value are extracted after the deployment of all the nodes. Then, by using Moore Graph 1‐Separation Formula Kemeny Constant, a planar graph is plotted. After taking all the edge nodes, the exact location of the nodes is discovered by using the Trilateration‐based Gorilla Troop Optimization along with the SAT‐3 algorithm (T‐GTO‐SAT‐3). Then, by using True‐True Matching, the location results are matched with the original node deployment status. Moreover, by using FLOG, the location signature is generated and the nodes are localized. Next, by using Eulerian Learning (EL), the dissemination line setup is done. Lastly, based on the threshold values, the network lifetime is calculated. Hence, the results proved that the proposed model obtained a Mean Localization Error (MLE) of 0.01, which outperformed traditional approaches.

  • Research Article
  • 10.1371/journal.pone.0326078
WSNs data acquisition by combining expected network coverage and clustered compressed sensing
  • Jun 17, 2025
  • PLOS One
  • Zhouzhou Liu + 7 more

To tackle the challenges of extensive data transmission and high redundancy in wireless sensor networks (WSNs), this study proposes a novel data collection scheme based on expected network coverage and clustered compressive sensing (CS). First, the K-medoids clustering algorithm organizes nodes within the WSN coverage area into clusters. Combined with an optimized network coverage algorithm, a node scheduling strategy is introduced to focus on critical observation areas while minimizing overall energy consumption. Next, by analyzing the relationship between network clustering and node deployment, a weakly correlated observation matrix is designed to mitigate the impact of packet loss on data collection. Finally, the sparrow search algorithm is employed to enhance the accuracy of CS data reconstruction at the cluster head. Simulation results demonstrate that, compared to existing data collection schemes, the proposed approach significantly reduces WSN transmission overhead, ensures accurate recovery of raw data, decreases data reconstruction error, and extends network lifetime.

  • Research Article
  • 10.3390/s25123787
A Modified Differential Evolution for Source Localization Using RSS Measurements
  • Jun 17, 2025
  • Sensors (Basel, Switzerland)
  • Yunjie Tao + 2 more

In wireless sensor networks, evolutionary algorithms have emerged as pivotal tools for addressing complex localization challenges inherent in non-convex and nonlinear maximum likelihood estimation problems associated with received signal strength (RSS) measurements. While differential evolution (DE) has demonstrated notable efficacy in optimizing multimodal cost functions, conventional implementations often grapple with suboptimal convergence rates and susceptibility to local optima. To overcome these limitations, this paper proposes a novel enhancement of DE by integrating opposition-based learning (OBL) principles. The proposed method introduces an adaptive scaling factor that dynamically balances global exploration and local exploitation during the evolutionary process, coupled with a penalty-augmented cost function to effectively utilize boundary information while eliminating explicit constraint handling. Comparative evaluations against state-of-the-art techniques—including semidefinite programming, linear least squares, and simulated annealing—reveal significant improvements in both convergence speed and positioning precision. Experimental results under diverse noise conditions and network configurations further validate the robustness and superiority of the proposed approach, particularly in scenarios characterized by high environmental uncertainty or sparse anchor node deployments.

  • Research Article
  • 10.1142/s0129156425405881
A Novel Detection Algorithm for Anomalies and Attacks on Electric Vehicle Charging Stations Using Distributed Data Privacy Protection
  • Jun 16, 2025
  • International Journal of High Speed Electronics and Systems
  • Fei Zeng + 5 more

Electric vehicles with charging stations are being rapidly deployed. Traditional methods for detecting anomalies and attacks on charging stations merely employ local data, resulting in lower detection accuracy. Intuitively, centralized federated learning approaches impose heavy computational loads on the central node. When the central node experiences abnormalities or failures, the charging station network may encounter data isolation. This paper starts from individual charging stations and utilizes a transformer for anomaly and attack detection. Based on this, a distributed privacy-preserving data aggregation scheme is proposed. More specifically, the transformer effectively eliminates the influence of abnormal data fluctuations on detection accuracy. The proposed scheme dynamically aggregates data through a distributed federated learning framework without requiring any prior knowledge or central node deployment. In addition, considering the statistical characteristics of the model parameters, an effective model parameter updating method is proposed to reduce the communication bandwidth requirement in distributed federation learning and enhance the algorithm’s robustness. According to the results, the suggested system may safely detect anomalous activity or possible threats at EV charging stations while safeguarding user privacy.

  • Research Article
  • 10.1007/s10586-025-05153-y
The impact of connectivity and software in Ethereum validator performance
  • Jun 16, 2025
  • Cluster Computing
  • Mikel Cortes-Goicoechea + 3 more

Modern public blockchains like Ethereum rely on p2p networks to run distributed and censorship-resistant applications. With its wide adoption, it operates as a highly critical public ledger. On its transition to become more scalable and sustainable, shifting to PoS without sacrificing the security and resilience of PoW, Ethereum offers a range of consensus client implementations to participate in the network. In this paper, we present a methodology to measure the performance of the consensus clients based on the latency to receive messages from the p2p network. The paper includes a study that identifies the incentives and limitations that the network experiences, presenting insights about the latency impact derived from running the different consensus implementations at different locations. Our study highlights the need for a holistic approach to node deployment, where hardware, software, and geographic factors have to be carefully considered. Properly dimensioned hardware is essential to mitigate latency-related performance issues and ensure the reliable operation of beacon nodes, especially in geographically distant locations.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • .
  • .
  • .
  • 10
  • 1
  • 2
  • 3
  • 4
  • 5

Popular topics

  • Latest Artificial Intelligence papers
  • Latest Nursing papers
  • Latest Psychology Research papers
  • Latest Sociology Research papers
  • Latest Business Research papers
  • Latest Marketing Research papers
  • Latest Social Research papers
  • Latest Education Research papers
  • Latest Accounting Research papers
  • Latest Mental Health papers
  • Latest Economics papers
  • Latest Education Research papers
  • Latest Climate Change Research papers
  • Latest Mathematics Research papers

Most cited papers

  • Most cited Artificial Intelligence papers
  • Most cited Nursing papers
  • Most cited Psychology Research papers
  • Most cited Sociology Research papers
  • Most cited Business Research papers
  • Most cited Marketing Research papers
  • Most cited Social Research papers
  • Most cited Education Research papers
  • Most cited Accounting Research papers
  • Most cited Mental Health papers
  • Most cited Economics papers
  • Most cited Education Research papers
  • Most cited Climate Change Research papers
  • Most cited Mathematics Research papers

Latest papers from journals

  • Scientific Reports latest papers
  • PLOS ONE latest papers
  • Journal of Clinical Oncology latest papers
  • Nature Communications latest papers
  • BMC Geriatrics latest papers
  • Science of The Total Environment latest papers
  • Medical Physics latest papers
  • Cureus latest papers
  • Cancer Research latest papers
  • Chemosphere latest papers
  • International Journal of Advanced Research in Science latest papers
  • Communication and Technology latest papers

Latest papers from institutions

  • Latest research from French National Centre for Scientific Research
  • Latest research from Chinese Academy of Sciences
  • Latest research from Harvard University
  • Latest research from University of Toronto
  • Latest research from University of Michigan
  • Latest research from University College London
  • Latest research from Stanford University
  • Latest research from The University of Tokyo
  • Latest research from Johns Hopkins University
  • Latest research from University of Washington
  • Latest research from University of Oxford
  • Latest research from University of Cambridge

Popular Collections

  • Research on Reduced Inequalities
  • Research on No Poverty
  • Research on Gender Equality
  • Research on Peace Justice & Strong Institutions
  • Research on Affordable & Clean Energy
  • Research on Quality Education
  • Research on Clean Water & Sanitation
  • Research on COVID-19
  • Research on Monkeypox
  • Research on Medical Specialties
  • Research on Climate Justice
Discovery logo
FacebookTwitterLinkedinInstagram

Download the FREE App

  • Play store Link
  • App store Link
  • Scan QR code to download FREE App

    Scan to download FREE App

  • Google PlayApp Store
FacebookTwitterTwitterInstagram
  • Universities & Institutions
  • Publishers
  • R Discovery PrimeNew
  • Ask R Discovery
  • Blog
  • Accessibility
  • Topics
  • Journals
  • Open Access Papers
  • Year-wise Publications
  • Recently published papers
  • Pre prints
  • Questions
  • FAQs
  • Contact us
Lead the way for us

Your insights are needed to transform us into a better research content provider for researchers.

Share your feedback here.

FacebookTwitterLinkedinInstagram
Cactus Communications logo

Copyright 2025 Cactus Communications. All rights reserved.

Privacy PolicyCookies PolicyTerms of UseCareers