Journal articles on the topic 'SENCER NETWORKS'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'SENCER NETWORKS.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
THATIPAMULA RAJU, THATIPAMULA RAJU, and D. DEEPIKA RANI D. DEEPIKA RANI. "Achieving Network Level Privacy in Wireless Sensor Networks." International Journal of Scientific Research 2, no. 8 (June 1, 2012): 183–87. http://dx.doi.org/10.15373/22778179/aug2013/61.
Full textHari, Parli Baijnath, and Shailendra Narayan Singh. "Security Attacks at MAC and Network Layer in Wireless Sensor Networks." Journal of Advanced Research in Dynamical and Control Systems 11, no. 12 (December 20, 2019): 82–89. http://dx.doi.org/10.5373/jardcs/v11i12/20193215.
Full textDan, Ngoc Pham Thi, Khuong Ho Van, Hanh Dang Ngoc, Thiem Do Dac, Phong Nguyen Huu, Son Vo Que, Son Pham Ngoc, and Lien Hong Pham. "SECURITY CAPABILITY ANALYSIS OF COGNITIVE RADIO NETWORK WITH SECONDARY USER CAPABLE OF JAMMING AND SELF-POWERING." Journal of Computer Science and Cybernetics 36, no. 3 (August 18, 2020): 205–31. http://dx.doi.org/10.15625/1813-9663/36/3/14987.
Full textGhaffari, Fatemeh, Seyed Pooya Shariatpanahi, Mahdi Jafari Siavoshani, and Behnam Bahrak. "Multi-Sender Index Coding Over Linear Networks." IEEE Communications Letters 26, no. 2 (February 2022): 273–76. http://dx.doi.org/10.1109/lcomm.2021.3132988.
Full textEt. al., Manoj Kumar,. "An Optimized Utilization of Battery Backup in MANET Using Modified Firefly Algorithm." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 11, 2021): 2086–94. http://dx.doi.org/10.17762/turcomat.v12i2.1813.
Full textDalkılıç, Gökhan, and Devrim Sipahi. "Spam filtering with sender authentication network." Computer Communications 98 (January 2017): 72–79. http://dx.doi.org/10.1016/j.comcom.2016.12.008.
Full textNisar, Kashif, Angela Amphawan, and Suhaidi B. Hassan. "Comprehensive Structure of Novel Voice Priority Queue Scheduling System Model for VoIP Over WLANs." International Journal of Advanced Pervasive and Ubiquitous Computing 3, no. 4 (October 2011): 50–70. http://dx.doi.org/10.4018/japuc.2011100106.
Full textCepl, Miroslav, and Jiří Šťastný. "Progressive optimization methods for applied in computer network." Acta Universitatis Agriculturae et Silviculturae Mendelianae Brunensis 57, no. 6 (2009): 45–50. http://dx.doi.org/10.11118/actaun200957060045.
Full textSheelavant, Kumaresh, and R. Sumathi. "Dynamic Compilation of Pattern based clustering and Volumetric Probabilistic Mining for Network Routing in Cognitive Radio Sensor Networks." Indian Journal of Science and Technology 14, no. 41 (November 3, 2021): 3093–106. http://dx.doi.org/10.17485/ijst/v14i41.1838.
Full textWidyarto, Ervan Yudi, and Chairul Anwar. "Build Social Networks-Based Audio Engineering (Design And Build An Audio-Based Social Network)." Eduvest - Journal Of Universal Studies 2, no. 1 (January 20, 2022): 48–54. http://dx.doi.org/10.36418/edv.v2i1.330.
Full textWidyarto, Ervan Yudi, and Chairul Anwar. "Build Social Networks-Based Audio Engineering (Design And Build An Audio-Based Social Network)." Eduvest - Journal of Universal Studies 2, no. 1 (January 20, 2022): 48–54. http://dx.doi.org/10.59188/eduvest.v2i1.330.
Full textKung, H. T., Koan-Sin Tan, and Pai-Hsiang Hsiao. "TCP with sender-based delay control." Computer Communications 26, no. 14 (September 2003): 1614–21. http://dx.doi.org/10.1016/s0140-3664(03)00110-5.
Full textCha, Hyun Jong, Jin Mook Kim, and Hwang Bin Ryou. "A Route Selection Mechanism for Mobility of Node in Mobile Ad Hoc Network." Applied Mechanics and Materials 224 (November 2012): 520–23. http://dx.doi.org/10.4028/www.scientific.net/amm.224.520.
Full textS, Rakshana. "Wireless Sensor Network." International Journal of Research Publication and Reviews 4, no. 4 (April 8, 2023): 1729–31. http://dx.doi.org/10.55248/gengpi.2023.4.4.35444.
Full textK.P, Aravinth. "Comparison of Fuzzy-based Cluster Head Selection Algorithm with LEACH Algorithm in Wireless Sensor Networks to Maximize Network Lifetime." Revista Gestão Inovação e Tecnologias 11, no. 4 (July 10, 2021): 1277–88. http://dx.doi.org/10.47059/revistageintec.v11i4.2186.
Full textAshokkumar, Jobanputra Paresh, and Prof Arun Jhapate. "A Review of Sensor Node in Wireless Sensor Networks." International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (June 30, 2019): 124–27. http://dx.doi.org/10.31142/ijtsrd23620.
Full textP., Renuka Devi. "Underwater Communication Using Wireless Sensor Networks." International Journal of Psychosocial Rehabilitation 24, no. 5 (April 20, 2020): 2264–75. http://dx.doi.org/10.37200/ijpr/v24i5/pr201925.
Full textShokrzadeh, Hamid, M. R. Majma, A. Movassagh, and M. Saheb. "Routing Security in Wireless Sensor Networks." Lecture Notes on Software Engineering 3, no. 4 (2015): 303–7. http://dx.doi.org/10.7763/lnse.2015.v3.209.
Full textBein, Adrian Sean, and Alexander Williams. "Networking IP Restriction filtering and network address." IAIC Transactions on Sustainable Digital Innovation (ITSDI) 1, no. 2 (April 30, 2020): 172–77. http://dx.doi.org/10.34306/itsdi.v1i2.149.
Full textKumarganesh, S., S. Anthoniraj, T. Senthil Kumar, P. Elayaraja, A. Christina Josephine Malathi, M. Somaskandan, and Gashaw Bekele. "A Novel Analytical Framework Is Developed for Wireless Heterogeneous Networks for Video Streaming Applications." Journal of Mathematics 2022 (September 13, 2022): 1–7. http://dx.doi.org/10.1155/2022/2100883.
Full textOlanrewaju, Oyenike Mary, Adebayo Abdulhafeez Abdulwasiu, and Nuhu Abdulhafiz. "Enhanced On-demand Distance Vector Routing Protocol to prevent Blackhole Attack in MANET." International Journal of Software Engineering and Computer Systems 9, no. 1 (January 24, 2023): 68–75. http://dx.doi.org/10.15282/ijsecs.9.1.2023.7.0111.
Full textAjmal, Mian M., and Yohanes Kristianto. "Knowledge Sharing in Supply Chain." International Journal of Strategic Decision Sciences 1, no. 4 (October 2010): 44–55. http://dx.doi.org/10.4018/jsds.2010100103.
Full textLi, Tao Tao, Feng Yang, and Ming Chu Liu. "Data Transmission of Ground Penetrating Radar over Wireless Network." Applied Mechanics and Materials 701-702 (December 2014): 961–64. http://dx.doi.org/10.4028/www.scientific.net/amm.701-702.961.
Full textGemmill, Jill. "Network basics for telemedicine." Journal of Telemedicine and Telecare 11, no. 2 (March 1, 2005): 71–76. http://dx.doi.org/10.1258/1357633053499822.
Full textLi, Feng Yun, Fu Xiang Gao, Lan Yao, and Gui Ran Chang. "A Game Theory Based Approach for Routing in Wireless Sensor Networks." Advanced Engineering Forum 2-3 (December 2011): 599–603. http://dx.doi.org/10.4028/www.scientific.net/aef.2-3.599.
Full textQin, Yu Jue, and Zhi Hui Ge. "Area Partition-Based Suppression Algorithm for Contention-Based Forwarding in Mobile Ad-Hoc Networks." Applied Mechanics and Materials 239-240 (December 2012): 1360–67. http://dx.doi.org/10.4028/www.scientific.net/amm.239-240.1360.
Full textDe Caro, Angelo, Vincenzo Iovino, and Adam O'Neill. "Receiver- and sender-deniable functional encryption." IET Information Security 12, no. 3 (May 1, 2018): 207–16. http://dx.doi.org/10.1049/iet-ifs.2017.0040.
Full textEt. al., Ramadevi Chappala. "A Cached Based Multipath Load Balancing Technique for Internet of Things Sensor Networks." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (April 11, 2021): 5399–405. http://dx.doi.org/10.17762/turcomat.v12i3.2186.
Full textAhmad, Amal, and Shereen Ismail. "User Selective Encryption Method for Securing MANETs." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (October 1, 2018): 3103. http://dx.doi.org/10.11591/ijece.v8i5.pp3103-3111.
Full textWang, Lili, Yajuan Qin, Huachun Zhou, Jianfeng Guan, and Hongke Zhang. "Design, Implementation, and Performance Evaluation of Efficient PMIPv6 Based Mobile Multicast Sender Support Schemes." Mobile Information Systems 2015 (2015): 1–17. http://dx.doi.org/10.1155/2015/741460.
Full textKu, Jun Hua, Zhi Hua Cai, Ye Tong Wang, and Bing Zheng. "One-Pass Authenticated Key Establishment Protocol on Optimal Eta Pairings for Wireless Sensor Networks." Applied Mechanics and Materials 556-562 (May 2014): 4482–86. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.4482.
Full textSharma, Ishu, and K. R. Ramkumar. "A survey on ACO based multipath routing algorithms for ad hoc networks." International Journal of Pervasive Computing and Communications 13, no. 4 (November 6, 2017): 370–85. http://dx.doi.org/10.1108/ijpcc-d-17-00015.
Full textBae, Shi Kyu. "Enhanced Timing-Sync Protocol for Sensor Networks." International Journal of Future Computer and Communication 4, no. 3 (2015): 179–83. http://dx.doi.org/10.7763/ijfcc.2015.v4.380.
Full textPrathap, Jomma, and Ramavath Janu. "All Data Aggregation in Wireless Sensor Networks." International Journal of Innovative Research in Engineering & Management 4, no. 6 (November 2017): 757–60. http://dx.doi.org/10.21276/ijirem.2017.4.6.2.
Full textShevchuk, Y. V., E. V. Shevchuk, A. Y. Ponomarev, I. A. Vogt, A. V. Elistratov, A. Y. Vakhrin, and R. E. Yarovicyn. "Etherbox: a protocol for modular sensor networks." Program Systems: Theory and Applications 8, no. 4 (2017): 285–303. http://dx.doi.org/10.25209/2079-3316-2017-8-4-285-303.
Full textKori, Kaveri, and Prof Patil Yogita Dattatraya. "Efficient Routing Technique for Wireless Sensor Networks." International Journal of Trend in Scientific Research and Development Volume-2, Issue-5 (August 31, 2018): 2399–403. http://dx.doi.org/10.31142/ijtsrd18321.
Full textHiremath, Veeresh M., and Dr G. A. Bidkar. "Power Optimization Techniques in Wireless Sensor Networks." Bonfring International Journal of Research in Communication Engineering 6, Special Issue (November 30, 2016): 83–84. http://dx.doi.org/10.9756/bijrce.8207.
Full textS, Pothumani, and Srividhya R. "Improvisation of Sensor Networks - A New Technique." Journal of Advanced Research in Dynamical and Control Systems 11, no. 09-SPECIAL ISSUE (September 25, 2019): 62–67. http://dx.doi.org/10.5373/jardcs/v11/20192536.
Full textAlrashed, Ebrahim A., and Mehmet Hakan Karaata. "Imposter Detection in Mobile Wireless Sensor Networks." International Journal of Computer and Communication Engineering 3, no. 6 (2014): 434–41. http://dx.doi.org/10.7763/ijcce.2014.v3.364.
Full textKurdi, Shivan Fazil. "Mobility-Based Routing in Opportunistic Networks." International Journal of Technology Diffusion 3, no. 2 (April 2012): 28–35. http://dx.doi.org/10.4018/jtd.2012040103.
Full textDuBois, Christopher, James Foulds, and Padhraic Smyth. "Latent Set Models for Two-Mode Network Data." Proceedings of the International AAAI Conference on Web and Social Media 5, no. 1 (August 3, 2021): 137–44. http://dx.doi.org/10.1609/icwsm.v5i1.14131.
Full textMANASA I P, MANASA I. P., and BALASUBRAMANI R. BALASUBRAMANI R. "Multi-Level Network Scheduling Scheme for Wireless Sensor Network." International Journal of Scientific Research 3, no. 5 (June 1, 2012): 282–87. http://dx.doi.org/10.15373/22778179/may2014/87.
Full textRavindranath, P. V., and Dr D. Maheswari. "Optimal Energy and Network Lifetime Maximization using a Modified Bat Optimization Algorithm MBAT under Coverage Constrained Problems over Heterogeneous Wireless Sensor Networks." International Journal of Trend in Scientific Research and Development Volume-1, Issue-6 (October 31, 2017): 1027–36. http://dx.doi.org/10.31142/ijtsrd4731.
Full textJavaid, Nadeem, Abdul Majid, Arshad Sher, Wazir Khan, and Mohammed Aalsalem. "Avoiding Void Holes and Collisions with Reliable and Interference-Aware Routing in Underwater WSNs." Sensors 18, no. 9 (September 11, 2018): 3038. http://dx.doi.org/10.3390/s18093038.
Full textKnieps, Günter. "Internet of Things, future networks, and the economics of virtual networks." Competition and Regulation in Network Industries 18, no. 3-4 (September 2017): 240–55. http://dx.doi.org/10.1177/1783591718784398.
Full textAhmed, Ayam Tawfeek, Ahmed Noori Rashid, and Khalid Shaker. "Localization in Wireless Sensor Network." Webology 19, no. 1 (January 20, 2022): 692–704. http://dx.doi.org/10.14704/web/v19i1/web19049.
Full textNurfitriana, Tyas, Jafaruddin Gusti Amri Ginting, and Kukuh Nugroho. "Energy consumption analysis of DSR reactive routing protocol on mobile ad-hoc network." JURNAL INFOTEL 15, no. 1 (February 1, 2023): 89–96. http://dx.doi.org/10.20895/infotel.v15i1.817.
Full textKumar, Vikash, Shivam Kumar Gupta, Harsh Sharma, Uchit Bhadauriya, and Chandra Prakash Varma. "A Review Paper on Voice Isolation Using Artificial Neural Network." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 781–84. http://dx.doi.org/10.22214/ijraset.2022.40745.
Full textAfianti, Farah, Wirawan, and Titiek Suryani. "Dynamic Cipher Puzzle for Efficient Broadcast Authentication in Wireless Sensor Networks." Sensors 18, no. 11 (November 18, 2018): 4021. http://dx.doi.org/10.3390/s18114021.
Full textNguyen, Dung T., Duc-Tai Le, Moonseong Kim, and Hyunseung Choo. "Delay-Aware Reverse Approach for Data Aggregation Scheduling in Wireless Sensor Networks." Sensors 19, no. 20 (October 17, 2019): 4511. http://dx.doi.org/10.3390/s19204511.
Full text