Artículos de revistas sobre el tema "SENCER NETWORKS"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "SENCER NETWORKS".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
THATIPAMULA RAJU, THATIPAMULA RAJU y D. DEEPIKA RANI D. DEEPIKA RANI. "Achieving Network Level Privacy in Wireless Sensor Networks". International Journal of Scientific Research 2, n.º 8 (1 de junio de 2012): 183–87. http://dx.doi.org/10.15373/22778179/aug2013/61.
Texto completoHari, Parli Baijnath y Shailendra Narayan Singh. "Security Attacks at MAC and Network Layer in Wireless Sensor Networks". Journal of Advanced Research in Dynamical and Control Systems 11, n.º 12 (20 de diciembre de 2019): 82–89. http://dx.doi.org/10.5373/jardcs/v11i12/20193215.
Texto completoDan, Ngoc Pham Thi, Khuong Ho Van, Hanh Dang Ngoc, Thiem Do Dac, Phong Nguyen Huu, Son Vo Que, Son Pham Ngoc y Lien Hong Pham. "SECURITY CAPABILITY ANALYSIS OF COGNITIVE RADIO NETWORK WITH SECONDARY USER CAPABLE OF JAMMING AND SELF-POWERING". Journal of Computer Science and Cybernetics 36, n.º 3 (18 de agosto de 2020): 205–31. http://dx.doi.org/10.15625/1813-9663/36/3/14987.
Texto completoGhaffari, Fatemeh, Seyed Pooya Shariatpanahi, Mahdi Jafari Siavoshani y Behnam Bahrak. "Multi-Sender Index Coding Over Linear Networks". IEEE Communications Letters 26, n.º 2 (febrero de 2022): 273–76. http://dx.doi.org/10.1109/lcomm.2021.3132988.
Texto completoEt. al., Manoj Kumar,. "An Optimized Utilization of Battery Backup in MANET Using Modified Firefly Algorithm". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, n.º 2 (11 de abril de 2021): 2086–94. http://dx.doi.org/10.17762/turcomat.v12i2.1813.
Texto completoDalkılıç, Gökhan y Devrim Sipahi. "Spam filtering with sender authentication network". Computer Communications 98 (enero de 2017): 72–79. http://dx.doi.org/10.1016/j.comcom.2016.12.008.
Texto completoNisar, Kashif, Angela Amphawan y Suhaidi B. Hassan. "Comprehensive Structure of Novel Voice Priority Queue Scheduling System Model for VoIP Over WLANs". International Journal of Advanced Pervasive and Ubiquitous Computing 3, n.º 4 (octubre de 2011): 50–70. http://dx.doi.org/10.4018/japuc.2011100106.
Texto completoCepl, Miroslav y Jiří Šťastný. "Progressive optimization methods for applied in computer network". Acta Universitatis Agriculturae et Silviculturae Mendelianae Brunensis 57, n.º 6 (2009): 45–50. http://dx.doi.org/10.11118/actaun200957060045.
Texto completoSheelavant, Kumaresh y R. Sumathi. "Dynamic Compilation of Pattern based clustering and Volumetric Probabilistic Mining for Network Routing in Cognitive Radio Sensor Networks". Indian Journal of Science and Technology 14, n.º 41 (3 de noviembre de 2021): 3093–106. http://dx.doi.org/10.17485/ijst/v14i41.1838.
Texto completoWidyarto, Ervan Yudi y Chairul Anwar. "Build Social Networks-Based Audio Engineering (Design And Build An Audio-Based Social Network)". Eduvest - Journal Of Universal Studies 2, n.º 1 (20 de enero de 2022): 48–54. http://dx.doi.org/10.36418/edv.v2i1.330.
Texto completoWidyarto, Ervan Yudi y Chairul Anwar. "Build Social Networks-Based Audio Engineering (Design And Build An Audio-Based Social Network)". Eduvest - Journal of Universal Studies 2, n.º 1 (20 de enero de 2022): 48–54. http://dx.doi.org/10.59188/eduvest.v2i1.330.
Texto completoKung, H. T., Koan-Sin Tan y Pai-Hsiang Hsiao. "TCP with sender-based delay control". Computer Communications 26, n.º 14 (septiembre de 2003): 1614–21. http://dx.doi.org/10.1016/s0140-3664(03)00110-5.
Texto completoCha, Hyun Jong, Jin Mook Kim y Hwang Bin Ryou. "A Route Selection Mechanism for Mobility of Node in Mobile Ad Hoc Network". Applied Mechanics and Materials 224 (noviembre de 2012): 520–23. http://dx.doi.org/10.4028/www.scientific.net/amm.224.520.
Texto completoS, Rakshana. "Wireless Sensor Network". International Journal of Research Publication and Reviews 4, n.º 4 (8 de abril de 2023): 1729–31. http://dx.doi.org/10.55248/gengpi.2023.4.4.35444.
Texto completoK.P, Aravinth. "Comparison of Fuzzy-based Cluster Head Selection Algorithm with LEACH Algorithm in Wireless Sensor Networks to Maximize Network Lifetime". Revista Gestão Inovação e Tecnologias 11, n.º 4 (10 de julio de 2021): 1277–88. http://dx.doi.org/10.47059/revistageintec.v11i4.2186.
Texto completoAshokkumar, Jobanputra Paresh y Prof Arun Jhapate. "A Review of Sensor Node in Wireless Sensor Networks". International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (30 de junio de 2019): 124–27. http://dx.doi.org/10.31142/ijtsrd23620.
Texto completoP., Renuka Devi. "Underwater Communication Using Wireless Sensor Networks". International Journal of Psychosocial Rehabilitation 24, n.º 5 (20 de abril de 2020): 2264–75. http://dx.doi.org/10.37200/ijpr/v24i5/pr201925.
Texto completoShokrzadeh, Hamid, M. R. Majma, A. Movassagh y M. Saheb. "Routing Security in Wireless Sensor Networks". Lecture Notes on Software Engineering 3, n.º 4 (2015): 303–7. http://dx.doi.org/10.7763/lnse.2015.v3.209.
Texto completoBein, Adrian Sean y Alexander Williams. "Networking IP Restriction filtering and network address". IAIC Transactions on Sustainable Digital Innovation (ITSDI) 1, n.º 2 (30 de abril de 2020): 172–77. http://dx.doi.org/10.34306/itsdi.v1i2.149.
Texto completoKumarganesh, S., S. Anthoniraj, T. Senthil Kumar, P. Elayaraja, A. Christina Josephine Malathi, M. Somaskandan y Gashaw Bekele. "A Novel Analytical Framework Is Developed for Wireless Heterogeneous Networks for Video Streaming Applications". Journal of Mathematics 2022 (13 de septiembre de 2022): 1–7. http://dx.doi.org/10.1155/2022/2100883.
Texto completoOlanrewaju, Oyenike Mary, Adebayo Abdulhafeez Abdulwasiu y Nuhu Abdulhafiz. "Enhanced On-demand Distance Vector Routing Protocol to prevent Blackhole Attack in MANET". International Journal of Software Engineering and Computer Systems 9, n.º 1 (24 de enero de 2023): 68–75. http://dx.doi.org/10.15282/ijsecs.9.1.2023.7.0111.
Texto completoAjmal, Mian M. y Yohanes Kristianto. "Knowledge Sharing in Supply Chain". International Journal of Strategic Decision Sciences 1, n.º 4 (octubre de 2010): 44–55. http://dx.doi.org/10.4018/jsds.2010100103.
Texto completoLi, Tao Tao, Feng Yang y Ming Chu Liu. "Data Transmission of Ground Penetrating Radar over Wireless Network". Applied Mechanics and Materials 701-702 (diciembre de 2014): 961–64. http://dx.doi.org/10.4028/www.scientific.net/amm.701-702.961.
Texto completoGemmill, Jill. "Network basics for telemedicine". Journal of Telemedicine and Telecare 11, n.º 2 (1 de marzo de 2005): 71–76. http://dx.doi.org/10.1258/1357633053499822.
Texto completoLi, Feng Yun, Fu Xiang Gao, Lan Yao y Gui Ran Chang. "A Game Theory Based Approach for Routing in Wireless Sensor Networks". Advanced Engineering Forum 2-3 (diciembre de 2011): 599–603. http://dx.doi.org/10.4028/www.scientific.net/aef.2-3.599.
Texto completoQin, Yu Jue y Zhi Hui Ge. "Area Partition-Based Suppression Algorithm for Contention-Based Forwarding in Mobile Ad-Hoc Networks". Applied Mechanics and Materials 239-240 (diciembre de 2012): 1360–67. http://dx.doi.org/10.4028/www.scientific.net/amm.239-240.1360.
Texto completoDe Caro, Angelo, Vincenzo Iovino y Adam O'Neill. "Receiver- and sender-deniable functional encryption". IET Information Security 12, n.º 3 (1 de mayo de 2018): 207–16. http://dx.doi.org/10.1049/iet-ifs.2017.0040.
Texto completoEt. al., Ramadevi Chappala. "A Cached Based Multipath Load Balancing Technique for Internet of Things Sensor Networks". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, n.º 3 (11 de abril de 2021): 5399–405. http://dx.doi.org/10.17762/turcomat.v12i3.2186.
Texto completoAhmad, Amal y Shereen Ismail. "User Selective Encryption Method for Securing MANETs". International Journal of Electrical and Computer Engineering (IJECE) 8, n.º 5 (1 de octubre de 2018): 3103. http://dx.doi.org/10.11591/ijece.v8i5.pp3103-3111.
Texto completoWang, Lili, Yajuan Qin, Huachun Zhou, Jianfeng Guan y Hongke Zhang. "Design, Implementation, and Performance Evaluation of Efficient PMIPv6 Based Mobile Multicast Sender Support Schemes". Mobile Information Systems 2015 (2015): 1–17. http://dx.doi.org/10.1155/2015/741460.
Texto completoKu, Jun Hua, Zhi Hua Cai, Ye Tong Wang y Bing Zheng. "One-Pass Authenticated Key Establishment Protocol on Optimal Eta Pairings for Wireless Sensor Networks". Applied Mechanics and Materials 556-562 (mayo de 2014): 4482–86. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.4482.
Texto completoSharma, Ishu y K. R. Ramkumar. "A survey on ACO based multipath routing algorithms for ad hoc networks". International Journal of Pervasive Computing and Communications 13, n.º 4 (6 de noviembre de 2017): 370–85. http://dx.doi.org/10.1108/ijpcc-d-17-00015.
Texto completoBae, Shi Kyu. "Enhanced Timing-Sync Protocol for Sensor Networks". International Journal of Future Computer and Communication 4, n.º 3 (2015): 179–83. http://dx.doi.org/10.7763/ijfcc.2015.v4.380.
Texto completoPrathap, Jomma y Ramavath Janu. "All Data Aggregation in Wireless Sensor Networks". International Journal of Innovative Research in Engineering & Management 4, n.º 6 (noviembre de 2017): 757–60. http://dx.doi.org/10.21276/ijirem.2017.4.6.2.
Texto completoShevchuk, Y. V., E. V. Shevchuk, A. Y. Ponomarev, I. A. Vogt, A. V. Elistratov, A. Y. Vakhrin y R. E. Yarovicyn. "Etherbox: a protocol for modular sensor networks". Program Systems: Theory and Applications 8, n.º 4 (2017): 285–303. http://dx.doi.org/10.25209/2079-3316-2017-8-4-285-303.
Texto completoKori, Kaveri y Prof Patil Yogita Dattatraya. "Efficient Routing Technique for Wireless Sensor Networks". International Journal of Trend in Scientific Research and Development Volume-2, Issue-5 (31 de agosto de 2018): 2399–403. http://dx.doi.org/10.31142/ijtsrd18321.
Texto completoHiremath, Veeresh M. y Dr G. A. Bidkar. "Power Optimization Techniques in Wireless Sensor Networks". Bonfring International Journal of Research in Communication Engineering 6, Special Issue (30 de noviembre de 2016): 83–84. http://dx.doi.org/10.9756/bijrce.8207.
Texto completoS, Pothumani y Srividhya R. "Improvisation of Sensor Networks - A New Technique". Journal of Advanced Research in Dynamical and Control Systems 11, n.º 09-SPECIAL ISSUE (25 de septiembre de 2019): 62–67. http://dx.doi.org/10.5373/jardcs/v11/20192536.
Texto completoAlrashed, Ebrahim A. y Mehmet Hakan Karaata. "Imposter Detection in Mobile Wireless Sensor Networks". International Journal of Computer and Communication Engineering 3, n.º 6 (2014): 434–41. http://dx.doi.org/10.7763/ijcce.2014.v3.364.
Texto completoKurdi, Shivan Fazil. "Mobility-Based Routing in Opportunistic Networks". International Journal of Technology Diffusion 3, n.º 2 (abril de 2012): 28–35. http://dx.doi.org/10.4018/jtd.2012040103.
Texto completoDuBois, Christopher, James Foulds y Padhraic Smyth. "Latent Set Models for Two-Mode Network Data". Proceedings of the International AAAI Conference on Web and Social Media 5, n.º 1 (3 de agosto de 2021): 137–44. http://dx.doi.org/10.1609/icwsm.v5i1.14131.
Texto completoMANASA I P, MANASA I. P. y BALASUBRAMANI R. BALASUBRAMANI R. "Multi-Level Network Scheduling Scheme for Wireless Sensor Network". International Journal of Scientific Research 3, n.º 5 (1 de junio de 2012): 282–87. http://dx.doi.org/10.15373/22778179/may2014/87.
Texto completoRavindranath, P. V. y Dr D. Maheswari. "Optimal Energy and Network Lifetime Maximization using a Modified Bat Optimization Algorithm MBAT under Coverage Constrained Problems over Heterogeneous Wireless Sensor Networks". International Journal of Trend in Scientific Research and Development Volume-1, Issue-6 (31 de octubre de 2017): 1027–36. http://dx.doi.org/10.31142/ijtsrd4731.
Texto completoJavaid, Nadeem, Abdul Majid, Arshad Sher, Wazir Khan y Mohammed Aalsalem. "Avoiding Void Holes and Collisions with Reliable and Interference-Aware Routing in Underwater WSNs". Sensors 18, n.º 9 (11 de septiembre de 2018): 3038. http://dx.doi.org/10.3390/s18093038.
Texto completoKnieps, Günter. "Internet of Things, future networks, and the economics of virtual networks". Competition and Regulation in Network Industries 18, n.º 3-4 (septiembre de 2017): 240–55. http://dx.doi.org/10.1177/1783591718784398.
Texto completoAhmed, Ayam Tawfeek, Ahmed Noori Rashid y Khalid Shaker. "Localization in Wireless Sensor Network". Webology 19, n.º 1 (20 de enero de 2022): 692–704. http://dx.doi.org/10.14704/web/v19i1/web19049.
Texto completoNurfitriana, Tyas, Jafaruddin Gusti Amri Ginting y Kukuh Nugroho. "Energy consumption analysis of DSR reactive routing protocol on mobile ad-hoc network". JURNAL INFOTEL 15, n.º 1 (1 de febrero de 2023): 89–96. http://dx.doi.org/10.20895/infotel.v15i1.817.
Texto completoKumar, Vikash, Shivam Kumar Gupta, Harsh Sharma, Uchit Bhadauriya y Chandra Prakash Varma. "A Review Paper on Voice Isolation Using Artificial Neural Network". International Journal for Research in Applied Science and Engineering Technology 10, n.º 3 (31 de marzo de 2022): 781–84. http://dx.doi.org/10.22214/ijraset.2022.40745.
Texto completoAfianti, Farah, Wirawan y Titiek Suryani. "Dynamic Cipher Puzzle for Efficient Broadcast Authentication in Wireless Sensor Networks". Sensors 18, n.º 11 (18 de noviembre de 2018): 4021. http://dx.doi.org/10.3390/s18114021.
Texto completoNguyen, Dung T., Duc-Tai Le, Moonseong Kim y Hyunseung Choo. "Delay-Aware Reverse Approach for Data Aggregation Scheduling in Wireless Sensor Networks". Sensors 19, n.º 20 (17 de octubre de 2019): 4511. http://dx.doi.org/10.3390/s19204511.
Texto completo