Sudhakar Sengan, O. Khalaf, G. Rao, D. Sharma, Amarendra K., A. A. Hamad
{"title":"使用机器学习的电子健康记录监测无线通信的安全感知路由","authors":"Sudhakar Sengan, O. Khalaf, G. Rao, D. Sharma, Amarendra K., A. A. Hamad","doi":"10.4018/ijrqeh.289176","DOIUrl":null,"url":null,"abstract":"An ad hoc structure is self-organizing, self-forming, and system-free, with no nearby associations. One of the significant limits we must focus on in frameworks is leading. As for directions, we can send the packet or communications from the sender to the recipient node. AODV Routing Protocol, a short display that will make the tutorial available on demand. Machine Learning (ML) based IDS must be integrated and perfected to support the detection of vulnerabilities and enable frameworks to make intrusion decisions while ML is about their mobile context. This paper considers the combined effect of stooped difficulties along the way, problems at the medium get-right-of-area to impact layer, or pack disasters triggered by the remote control going off route. The AODV as the Routing MANET protocol is used in this work, and the process is designed and evaluated using Support Vector Machine (SVM) to detect the malicious network nodes.","PeriodicalId":36298,"journal":{"name":"International Journal of Reliable and Quality E-Healthcare","volume":"1 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"41","resultStr":"{\"title\":\"Security-Aware Routing on Wireless Communication for E-Health Records Monitoring Using Machine Learning\",\"authors\":\"Sudhakar Sengan, O. Khalaf, G. Rao, D. Sharma, Amarendra K., A. A. Hamad\",\"doi\":\"10.4018/ijrqeh.289176\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"An ad hoc structure is self-organizing, self-forming, and system-free, with no nearby associations. One of the significant limits we must focus on in frameworks is leading. As for directions, we can send the packet or communications from the sender to the recipient node. AODV Routing Protocol, a short display that will make the tutorial available on demand. Machine Learning (ML) based IDS must be integrated and perfected to support the detection of vulnerabilities and enable frameworks to make intrusion decisions while ML is about their mobile context. This paper considers the combined effect of stooped difficulties along the way, problems at the medium get-right-of-area to impact layer, or pack disasters triggered by the remote control going off route. The AODV as the Routing MANET protocol is used in this work, and the process is designed and evaluated using Support Vector Machine (SVM) to detect the malicious network nodes.\",\"PeriodicalId\":36298,\"journal\":{\"name\":\"International Journal of Reliable and Quality E-Healthcare\",\"volume\":\"1 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"41\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Reliable and Quality E-Healthcare\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4018/ijrqeh.289176\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"Nursing\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Reliable and Quality E-Healthcare","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/ijrqeh.289176","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Nursing","Score":null,"Total":0}
Security-Aware Routing on Wireless Communication for E-Health Records Monitoring Using Machine Learning
An ad hoc structure is self-organizing, self-forming, and system-free, with no nearby associations. One of the significant limits we must focus on in frameworks is leading. As for directions, we can send the packet or communications from the sender to the recipient node. AODV Routing Protocol, a short display that will make the tutorial available on demand. Machine Learning (ML) based IDS must be integrated and perfected to support the detection of vulnerabilities and enable frameworks to make intrusion decisions while ML is about their mobile context. This paper considers the combined effect of stooped difficulties along the way, problems at the medium get-right-of-area to impact layer, or pack disasters triggered by the remote control going off route. The AODV as the Routing MANET protocol is used in this work, and the process is designed and evaluated using Support Vector Machine (SVM) to detect the malicious network nodes.