PapersFlow Research Brief
Advanced Technologies and Applied Computing
Research Guide
What is Advanced Technologies and Applied Computing?
Advanced Technologies and Applied Computing is a research cluster in computer networks and communications that develops efficient and intelligent methods for image transmission in wireless sensor networks, with applications in healthcare monitoring, IoT security, and machine learning.
The field encompasses 4,299 papers on topics including cooperative communication, security, machine learning, and data analytics for image transmission over IoT devices. Research addresses challenges in wireless sensor networks and MANETs for reliable data handling in dynamic environments. Growth data over the past 5 years is not available.
Topic Hierarchy
Research Sub-Topics
Wireless Sensor Network Routing
This sub-topic covers energy-efficient, hierarchical, and geographic routing protocols for WSNs with optimization algorithms. Researchers simulate scalability and fault tolerance in dense deployments.
Machine Learning for Image Transmission
This sub-topic focuses on compression, error correction, and QoS prediction using CNNs and reinforcement learning in bandwidth-constrained networks. Researchers benchmark against traditional codecs.
Security Protocols in IoT Networks
This sub-topic examines lightweight cryptography, blockchain integration, and intrusion detection for resource-limited IoT devices. Researchers test against attacks like Sybil and replay.
Cooperative Communication Strategies
This sub-topic studies relay selection, MIMO cooperation, and spectrum sharing to improve throughput in fading channels. Researchers derive theoretical capacity bounds and practical implementations.
Healthcare Monitoring with IoT
This sub-topic explores wearable sensors, edge analytics, and predictive models for vital signs and anomaly detection. Researchers validate through clinical trials and privacy frameworks.
Why It Matters
These technologies enable secure and efficient data transmission critical for healthcare applications, such as stroke risk prediction using machine learning, where Ηλίας Δρίτσας and Μαρία Τρίγκα (2022) achieved predictive models for early symptom recognition in "Stroke Risk Prediction with Machine Learning Techniques" with 253 citations. In MANETs, protocols like the improved hybrid secure multipath routing by Uppalapati Srilakshmi et al. (2021) with 169 citations protect data across intermediary nodes in disaster response and military scenarios. Energy-efficient routing in wireless sensor networks, as in Xingsi Xue et al. (2023)'s Harris-hawk-optimization approach with 140 citations, supports prolonged IoT deployments in healthcare monitoring.
Reading Guide
Where to Start
"Stroke Risk Prediction with Machine Learning Techniques" by Ηλίας Δρίτσας and Μαρία Τρίγκα (2022), as it provides a clear entry into machine learning applications for healthcare image and data transmission in sensor networks.
Key Papers Explained
Ηλίας Δρίτσας and Μαρία Τρίγκα (2022)'s "Stroke Risk Prediction with Machine Learning Techniques" establishes ML for healthcare prediction, which aligns with Neenavath Veeraiah et al. (2021)'s "Trust Aware Secure Energy Efficient Hybrid Protocol for MANET" extending security to energy-constrained networks. Uppalapati Srilakshmi et al. (2021)'s "An Improved Hybrid Secure Multipath Routing Protocol for MANET" builds on these by enhancing multipath security, while Xingsi Xue et al. (2023)'s "A Hybrid Cross Layer with Harris-Hawk-Optimization-Based Efficient Routing for Wireless Sensor Networks" integrates bio-inspired routing for WSN efficiency.
Paper Timeline
Most-cited paper highlighted in red. Papers ordered chronologically.
Advanced Directions
Jiahong Cai et al. (2023)'s "GTxChain: A Secure IoT Smart Blockchain Architecture Based on Graph Neural Network" advances IoT security with graph neural networks, targeting vulnerability in scaled deployments. Xingsi Xue et al. (2023)'s hybrid routing in WSNs pushes cross-layer QoS frontiers.
Papers at a Glance
| # | Paper | Year | Venue | Citations | Open Access |
|---|---|---|---|---|---|
| 1 | Stroke Risk Prediction with Machine Learning Techniques | 2022 | Sensors | 253 | ✓ |
| 2 | An Improved Hybrid Secure Multipath Routing Protocol for MANET | 2021 | IEEE Access | 169 | ✓ |
| 3 | A Secure Optimization Routing Algorithm for Mobile Ad Hoc Netw... | 2022 | IEEE Access | 155 | ✓ |
| 4 | Trust Aware Secure Energy Efficient Hybrid Protocol for MANET | 2021 | IEEE Access | 141 | ✓ |
| 5 | A Hybrid Cross Layer with Harris-Hawk-Optimization-Based Effic... | 2023 | Symmetry | 140 | ✓ |
| 6 | Research on the Natural Language Recognition Method Based on C... | 2021 | Mathematical Problems ... | 131 | ✓ |
| 7 | Spatial differentiation of traditional villages using ArcGIS a... | 2021 | Ecological Informatics | 130 | ✕ |
| 8 | Control of Time Delay Force Feedback Teleoperation System With... | 2022 | Frontiers in Neurorobo... | 122 | ✓ |
| 9 | GTxChain: A Secure IoT Smart Blockchain Architecture Based on ... | 2023 | IEEE Internet of Thing... | 107 | ✕ |
| 10 | Novel HealthCare Framework for Cardiac Arrest With the Applica... | 2021 | 2021 5th International... | 94 | ✕ |
Latest Developments
Recent developments in advanced technologies and applied computing research include breakthroughs in AI, such as generative coding, mechanistic interpretability, and human-like memory systems, as highlighted in MIT's 2026 list (MIT Technology Review), and emerging trends like AI-native development platforms and confidential computing identified by Gartner (Gartner). Additionally, innovations such as analog optical computers for AI inference and quantum AI applications are also notable (Nature, News.microsoft.com).
Sources
Frequently Asked Questions
What methods secure routing in MANETs?
Uppalapati Srilakshmi et al. (2021) proposed an improved hybrid secure multipath routing protocol in "An Improved Hybrid Secure Multipath Routing Protocol for MANET" that prevents hostile node interference during data traversal across intermediary nodes. Uppalapati Srilakshmi et al. (2022) developed a secure optimization routing algorithm in "A Secure Optimization Routing Algorithm for Mobile Ad Hoc Networks" addressing dynamic topologies in disasters and military use.
How does machine learning predict stroke risk?
Ηλίας Δρίτσας and Μαρία Τρίγκα (2022) applied machine learning techniques in "Stroke Risk Prediction with Machine Learning Techniques" to recognize early symptoms from blood flow interruptions, enabling prediction based on affected brain areas. The model provides valuable information for preventing disability through timely intervention.
What clustering improves energy efficiency in wireless sensor networks?
Xingsi Xue et al. (2023) introduced k-medoids with improved artificial-bee-colony clustering and Harris-hawks-optimization routing in "A Hybrid Cross Layer with Harris-Hawk-Optimization-Based Efficient Routing for Wireless Sensor Networks" to enhance QoS. This cross-layer approach manages energy in sensor nodes for sustained operation.
How does blockchain secure IoT networks?
Jiahong Cai et al. (2023) presented GTxChain, a graph neural network-based blockchain architecture in "GTxChain: A Secure IoT Smart Blockchain Architecture Based on Graph Neural Network," protecting against expanding security threats in large-scale IoT. It ensures privacy through distributed ledger mechanisms.
What is the role of neural networks in natural language recognition?
Li Guang et al. (2021) used cluster analysis with neural networks in "Research on the Natural Language Recognition Method Based on Cluster Analysis Using Neural Network" for dynamic knowledge system updates. The method applies clustering to various domains including language processing.
Open Research Questions
- ? How can finite-time convergence be achieved in time-delay force feedback teleoperation systems for precise control?
- ? What graph neural network optimizations best secure large-scale IoT against evolving attacks?
- ? Which hybrid protocols maximize trust and energy efficiency in dynamic MANET topologies?
- ? How do cross-layer optimizations with bio-inspired algorithms extend WSN lifetime under varying loads?
Recent Trends
The field maintains 4,299 works with focus on hybrid secure protocols, as evidenced by top-cited papers like Uppalapati Srilakshmi et al. at 169 citations and Neenavath Veeraiah et al. (2021) at 141 citations on MANET security.
2021Recent high-citation works include Xingsi Xue et al. with 140 citations on WSN routing and Jiahong Cai et al. (2023) with 107 citations on blockchain-IoT integration.
2023No preprints or news from the last 12 months are available.
Research Advanced Technologies and Applied Computing with AI
PapersFlow provides specialized AI tools for Computer Science researchers. Here are the most relevant for this topic:
AI Literature Review
Automate paper discovery and synthesis across 474M+ papers
Code & Data Discovery
Find datasets, code repositories, and computational tools
Deep Research Reports
Multi-source evidence synthesis with counter-evidence
AI Academic Writing
Write research papers with AI assistance and LaTeX support
See how researchers in Computer Science & AI use PapersFlow
Field-specific workflows, example queries, and use cases.
Start Researching Advanced Technologies and Applied Computing with AI
Search 474M+ papers, run AI-powered literature reviews, and write with integrated citations — all in one workspace.
See how PapersFlow works for Computer Science researchers