Artykuły w czasopismach na temat „SENCER NETWORKS”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „SENCER NETWORKS”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
THATIPAMULA RAJU, THATIPAMULA RAJU, i D. DEEPIKA RANI D. DEEPIKA RANI. "Achieving Network Level Privacy in Wireless Sensor Networks". International Journal of Scientific Research 2, nr 8 (1.06.2012): 183–87. http://dx.doi.org/10.15373/22778179/aug2013/61.
Pełny tekst źródłaHari, Parli Baijnath, i Shailendra Narayan Singh. "Security Attacks at MAC and Network Layer in Wireless Sensor Networks". Journal of Advanced Research in Dynamical and Control Systems 11, nr 12 (20.12.2019): 82–89. http://dx.doi.org/10.5373/jardcs/v11i12/20193215.
Pełny tekst źródłaDan, Ngoc Pham Thi, Khuong Ho Van, Hanh Dang Ngoc, Thiem Do Dac, Phong Nguyen Huu, Son Vo Que, Son Pham Ngoc i Lien Hong Pham. "SECURITY CAPABILITY ANALYSIS OF COGNITIVE RADIO NETWORK WITH SECONDARY USER CAPABLE OF JAMMING AND SELF-POWERING". Journal of Computer Science and Cybernetics 36, nr 3 (18.08.2020): 205–31. http://dx.doi.org/10.15625/1813-9663/36/3/14987.
Pełny tekst źródłaGhaffari, Fatemeh, Seyed Pooya Shariatpanahi, Mahdi Jafari Siavoshani i Behnam Bahrak. "Multi-Sender Index Coding Over Linear Networks". IEEE Communications Letters 26, nr 2 (luty 2022): 273–76. http://dx.doi.org/10.1109/lcomm.2021.3132988.
Pełny tekst źródłaEt. al., Manoj Kumar,. "An Optimized Utilization of Battery Backup in MANET Using Modified Firefly Algorithm". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, nr 2 (11.04.2021): 2086–94. http://dx.doi.org/10.17762/turcomat.v12i2.1813.
Pełny tekst źródłaDalkılıç, Gökhan, i Devrim Sipahi. "Spam filtering with sender authentication network". Computer Communications 98 (styczeń 2017): 72–79. http://dx.doi.org/10.1016/j.comcom.2016.12.008.
Pełny tekst źródłaNisar, Kashif, Angela Amphawan i Suhaidi B. Hassan. "Comprehensive Structure of Novel Voice Priority Queue Scheduling System Model for VoIP Over WLANs". International Journal of Advanced Pervasive and Ubiquitous Computing 3, nr 4 (październik 2011): 50–70. http://dx.doi.org/10.4018/japuc.2011100106.
Pełny tekst źródłaCepl, Miroslav, i Jiří Šťastný. "Progressive optimization methods for applied in computer network". Acta Universitatis Agriculturae et Silviculturae Mendelianae Brunensis 57, nr 6 (2009): 45–50. http://dx.doi.org/10.11118/actaun200957060045.
Pełny tekst źródłaSheelavant, Kumaresh, i R. Sumathi. "Dynamic Compilation of Pattern based clustering and Volumetric Probabilistic Mining for Network Routing in Cognitive Radio Sensor Networks". Indian Journal of Science and Technology 14, nr 41 (3.11.2021): 3093–106. http://dx.doi.org/10.17485/ijst/v14i41.1838.
Pełny tekst źródłaWidyarto, Ervan Yudi, i Chairul Anwar. "Build Social Networks-Based Audio Engineering (Design And Build An Audio-Based Social Network)". Eduvest - Journal Of Universal Studies 2, nr 1 (20.01.2022): 48–54. http://dx.doi.org/10.36418/edv.v2i1.330.
Pełny tekst źródłaWidyarto, Ervan Yudi, i Chairul Anwar. "Build Social Networks-Based Audio Engineering (Design And Build An Audio-Based Social Network)". Eduvest - Journal of Universal Studies 2, nr 1 (20.01.2022): 48–54. http://dx.doi.org/10.59188/eduvest.v2i1.330.
Pełny tekst źródłaKung, H. T., Koan-Sin Tan i Pai-Hsiang Hsiao. "TCP with sender-based delay control". Computer Communications 26, nr 14 (wrzesień 2003): 1614–21. http://dx.doi.org/10.1016/s0140-3664(03)00110-5.
Pełny tekst źródłaCha, Hyun Jong, Jin Mook Kim i Hwang Bin Ryou. "A Route Selection Mechanism for Mobility of Node in Mobile Ad Hoc Network". Applied Mechanics and Materials 224 (listopad 2012): 520–23. http://dx.doi.org/10.4028/www.scientific.net/amm.224.520.
Pełny tekst źródłaS, Rakshana. "Wireless Sensor Network". International Journal of Research Publication and Reviews 4, nr 4 (8.04.2023): 1729–31. http://dx.doi.org/10.55248/gengpi.2023.4.4.35444.
Pełny tekst źródłaK.P, Aravinth. "Comparison of Fuzzy-based Cluster Head Selection Algorithm with LEACH Algorithm in Wireless Sensor Networks to Maximize Network Lifetime". Revista Gestão Inovação e Tecnologias 11, nr 4 (10.07.2021): 1277–88. http://dx.doi.org/10.47059/revistageintec.v11i4.2186.
Pełny tekst źródłaAshokkumar, Jobanputra Paresh, i Prof Arun Jhapate. "A Review of Sensor Node in Wireless Sensor Networks". International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (30.06.2019): 124–27. http://dx.doi.org/10.31142/ijtsrd23620.
Pełny tekst źródłaP., Renuka Devi. "Underwater Communication Using Wireless Sensor Networks". International Journal of Psychosocial Rehabilitation 24, nr 5 (20.04.2020): 2264–75. http://dx.doi.org/10.37200/ijpr/v24i5/pr201925.
Pełny tekst źródłaShokrzadeh, Hamid, M. R. Majma, A. Movassagh i M. Saheb. "Routing Security in Wireless Sensor Networks". Lecture Notes on Software Engineering 3, nr 4 (2015): 303–7. http://dx.doi.org/10.7763/lnse.2015.v3.209.
Pełny tekst źródłaBein, Adrian Sean, i Alexander Williams. "Networking IP Restriction filtering and network address". IAIC Transactions on Sustainable Digital Innovation (ITSDI) 1, nr 2 (30.04.2020): 172–77. http://dx.doi.org/10.34306/itsdi.v1i2.149.
Pełny tekst źródłaKumarganesh, S., S. Anthoniraj, T. Senthil Kumar, P. Elayaraja, A. Christina Josephine Malathi, M. Somaskandan i Gashaw Bekele. "A Novel Analytical Framework Is Developed for Wireless Heterogeneous Networks for Video Streaming Applications". Journal of Mathematics 2022 (13.09.2022): 1–7. http://dx.doi.org/10.1155/2022/2100883.
Pełny tekst źródłaOlanrewaju, Oyenike Mary, Adebayo Abdulhafeez Abdulwasiu i Nuhu Abdulhafiz. "Enhanced On-demand Distance Vector Routing Protocol to prevent Blackhole Attack in MANET". International Journal of Software Engineering and Computer Systems 9, nr 1 (24.01.2023): 68–75. http://dx.doi.org/10.15282/ijsecs.9.1.2023.7.0111.
Pełny tekst źródłaAjmal, Mian M., i Yohanes Kristianto. "Knowledge Sharing in Supply Chain". International Journal of Strategic Decision Sciences 1, nr 4 (październik 2010): 44–55. http://dx.doi.org/10.4018/jsds.2010100103.
Pełny tekst źródłaLi, Tao Tao, Feng Yang i Ming Chu Liu. "Data Transmission of Ground Penetrating Radar over Wireless Network". Applied Mechanics and Materials 701-702 (grudzień 2014): 961–64. http://dx.doi.org/10.4028/www.scientific.net/amm.701-702.961.
Pełny tekst źródłaGemmill, Jill. "Network basics for telemedicine". Journal of Telemedicine and Telecare 11, nr 2 (1.03.2005): 71–76. http://dx.doi.org/10.1258/1357633053499822.
Pełny tekst źródłaLi, Feng Yun, Fu Xiang Gao, Lan Yao i Gui Ran Chang. "A Game Theory Based Approach for Routing in Wireless Sensor Networks". Advanced Engineering Forum 2-3 (grudzień 2011): 599–603. http://dx.doi.org/10.4028/www.scientific.net/aef.2-3.599.
Pełny tekst źródłaQin, Yu Jue, i Zhi Hui Ge. "Area Partition-Based Suppression Algorithm for Contention-Based Forwarding in Mobile Ad-Hoc Networks". Applied Mechanics and Materials 239-240 (grudzień 2012): 1360–67. http://dx.doi.org/10.4028/www.scientific.net/amm.239-240.1360.
Pełny tekst źródłaDe Caro, Angelo, Vincenzo Iovino i Adam O'Neill. "Receiver- and sender-deniable functional encryption". IET Information Security 12, nr 3 (1.05.2018): 207–16. http://dx.doi.org/10.1049/iet-ifs.2017.0040.
Pełny tekst źródłaEt. al., Ramadevi Chappala. "A Cached Based Multipath Load Balancing Technique for Internet of Things Sensor Networks". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, nr 3 (11.04.2021): 5399–405. http://dx.doi.org/10.17762/turcomat.v12i3.2186.
Pełny tekst źródłaAhmad, Amal, i Shereen Ismail. "User Selective Encryption Method for Securing MANETs". International Journal of Electrical and Computer Engineering (IJECE) 8, nr 5 (1.10.2018): 3103. http://dx.doi.org/10.11591/ijece.v8i5.pp3103-3111.
Pełny tekst źródłaWang, Lili, Yajuan Qin, Huachun Zhou, Jianfeng Guan i Hongke Zhang. "Design, Implementation, and Performance Evaluation of Efficient PMIPv6 Based Mobile Multicast Sender Support Schemes". Mobile Information Systems 2015 (2015): 1–17. http://dx.doi.org/10.1155/2015/741460.
Pełny tekst źródłaKu, Jun Hua, Zhi Hua Cai, Ye Tong Wang i Bing Zheng. "One-Pass Authenticated Key Establishment Protocol on Optimal Eta Pairings for Wireless Sensor Networks". Applied Mechanics and Materials 556-562 (maj 2014): 4482–86. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.4482.
Pełny tekst źródłaSharma, Ishu, i K. R. Ramkumar. "A survey on ACO based multipath routing algorithms for ad hoc networks". International Journal of Pervasive Computing and Communications 13, nr 4 (6.11.2017): 370–85. http://dx.doi.org/10.1108/ijpcc-d-17-00015.
Pełny tekst źródłaBae, Shi Kyu. "Enhanced Timing-Sync Protocol for Sensor Networks". International Journal of Future Computer and Communication 4, nr 3 (2015): 179–83. http://dx.doi.org/10.7763/ijfcc.2015.v4.380.
Pełny tekst źródłaPrathap, Jomma, i Ramavath Janu. "All Data Aggregation in Wireless Sensor Networks". International Journal of Innovative Research in Engineering & Management 4, nr 6 (listopad 2017): 757–60. http://dx.doi.org/10.21276/ijirem.2017.4.6.2.
Pełny tekst źródłaShevchuk, Y. V., E. V. Shevchuk, A. Y. Ponomarev, I. A. Vogt, A. V. Elistratov, A. Y. Vakhrin i R. E. Yarovicyn. "Etherbox: a protocol for modular sensor networks". Program Systems: Theory and Applications 8, nr 4 (2017): 285–303. http://dx.doi.org/10.25209/2079-3316-2017-8-4-285-303.
Pełny tekst źródłaKori, Kaveri, i Prof Patil Yogita Dattatraya. "Efficient Routing Technique for Wireless Sensor Networks". International Journal of Trend in Scientific Research and Development Volume-2, Issue-5 (31.08.2018): 2399–403. http://dx.doi.org/10.31142/ijtsrd18321.
Pełny tekst źródłaHiremath, Veeresh M., i Dr G. A. Bidkar. "Power Optimization Techniques in Wireless Sensor Networks". Bonfring International Journal of Research in Communication Engineering 6, Special Issue (30.11.2016): 83–84. http://dx.doi.org/10.9756/bijrce.8207.
Pełny tekst źródłaS, Pothumani, i Srividhya R. "Improvisation of Sensor Networks - A New Technique". Journal of Advanced Research in Dynamical and Control Systems 11, nr 09-SPECIAL ISSUE (25.09.2019): 62–67. http://dx.doi.org/10.5373/jardcs/v11/20192536.
Pełny tekst źródłaAlrashed, Ebrahim A., i Mehmet Hakan Karaata. "Imposter Detection in Mobile Wireless Sensor Networks". International Journal of Computer and Communication Engineering 3, nr 6 (2014): 434–41. http://dx.doi.org/10.7763/ijcce.2014.v3.364.
Pełny tekst źródłaKurdi, Shivan Fazil. "Mobility-Based Routing in Opportunistic Networks". International Journal of Technology Diffusion 3, nr 2 (kwiecień 2012): 28–35. http://dx.doi.org/10.4018/jtd.2012040103.
Pełny tekst źródłaDuBois, Christopher, James Foulds i Padhraic Smyth. "Latent Set Models for Two-Mode Network Data". Proceedings of the International AAAI Conference on Web and Social Media 5, nr 1 (3.08.2021): 137–44. http://dx.doi.org/10.1609/icwsm.v5i1.14131.
Pełny tekst źródłaMANASA I P, MANASA I. P., i BALASUBRAMANI R. BALASUBRAMANI R. "Multi-Level Network Scheduling Scheme for Wireless Sensor Network". International Journal of Scientific Research 3, nr 5 (1.06.2012): 282–87. http://dx.doi.org/10.15373/22778179/may2014/87.
Pełny tekst źródłaRavindranath, P. V., i Dr D. Maheswari. "Optimal Energy and Network Lifetime Maximization using a Modified Bat Optimization Algorithm MBAT under Coverage Constrained Problems over Heterogeneous Wireless Sensor Networks". International Journal of Trend in Scientific Research and Development Volume-1, Issue-6 (31.10.2017): 1027–36. http://dx.doi.org/10.31142/ijtsrd4731.
Pełny tekst źródłaJavaid, Nadeem, Abdul Majid, Arshad Sher, Wazir Khan i Mohammed Aalsalem. "Avoiding Void Holes and Collisions with Reliable and Interference-Aware Routing in Underwater WSNs". Sensors 18, nr 9 (11.09.2018): 3038. http://dx.doi.org/10.3390/s18093038.
Pełny tekst źródłaKnieps, Günter. "Internet of Things, future networks, and the economics of virtual networks". Competition and Regulation in Network Industries 18, nr 3-4 (wrzesień 2017): 240–55. http://dx.doi.org/10.1177/1783591718784398.
Pełny tekst źródłaAhmed, Ayam Tawfeek, Ahmed Noori Rashid i Khalid Shaker. "Localization in Wireless Sensor Network". Webology 19, nr 1 (20.01.2022): 692–704. http://dx.doi.org/10.14704/web/v19i1/web19049.
Pełny tekst źródłaNurfitriana, Tyas, Jafaruddin Gusti Amri Ginting i Kukuh Nugroho. "Energy consumption analysis of DSR reactive routing protocol on mobile ad-hoc network". JURNAL INFOTEL 15, nr 1 (1.02.2023): 89–96. http://dx.doi.org/10.20895/infotel.v15i1.817.
Pełny tekst źródłaKumar, Vikash, Shivam Kumar Gupta, Harsh Sharma, Uchit Bhadauriya i Chandra Prakash Varma. "A Review Paper on Voice Isolation Using Artificial Neural Network". International Journal for Research in Applied Science and Engineering Technology 10, nr 3 (31.03.2022): 781–84. http://dx.doi.org/10.22214/ijraset.2022.40745.
Pełny tekst źródłaAfianti, Farah, Wirawan i Titiek Suryani. "Dynamic Cipher Puzzle for Efficient Broadcast Authentication in Wireless Sensor Networks". Sensors 18, nr 11 (18.11.2018): 4021. http://dx.doi.org/10.3390/s18114021.
Pełny tekst źródłaNguyen, Dung T., Duc-Tai Le, Moonseong Kim i Hyunseung Choo. "Delay-Aware Reverse Approach for Data Aggregation Scheduling in Wireless Sensor Networks". Sensors 19, nr 20 (17.10.2019): 4511. http://dx.doi.org/10.3390/s19204511.
Pełny tekst źródła