EEC : Evaluation of Energy Consumption in Wireless Sensor Networks
暂无分享,去创建一个
Nazia Azim | Fazlullah Khan | Farman Ullah | F. Ullah | Nazia Azim | F. Khan | Muhammad Tahir | Syed Roohullah | Muhammad Tahir | Syed Roohullah | Fazlullah Khan
[1] Sameerchand Pudaruth,et al. PEOPLE FACTORS IN AGILE SOFTWARE DEVELOPMENT AND PROJECT MANAGEMENT , 2012 .
[2] Xiangjian He,et al. Cryptography-based secure data storage and sharing using HEVC and public clouds , 2017, Inf. Sci..
[3] Shahzad Khan,et al. Applications, limitations, and improvements in visible light communication systems , 2015, 2015 International Conference on Connected Vehicles and Expo (ICCVE).
[4] Iftikhar Ahmad,et al. A New Robust Video Watermarking Technique Using H.264/AAC Codec Luma Components Based On DCT , 2016 .
[5] Kenji Nakagawa,et al. Comparative study of spectrum sensing techniques in cognitive radio networks , 2013, 2013 World Congress on Computer and Information Technology (WCCIT).
[6] Kenji Nakagawa,et al. B-8-10 Cooperative Spectrum Sensing Techniques in Cognitive Radio Networks , 2012 .
[7] Xiangjian He,et al. PAWN: a payload‐based mutual authentication scheme for wireless sensor networks , 2017, Concurr. Comput. Pract. Exp..
[8] Jan L. Harrington. Denial of Service Attacks , 2005 .
[9] Mian Ahmad Jan,et al. Energy-efficient routing and secure communication in wireless sensor networks , 2016 .
[10] U.S. Tiwary,et al. Base station initiated dynamic routing protocol for Heterogeneous Wireless Sensor Network using clustering , 2008, 2008 Fourth International Conference on Wireless Communication and Sensor Networks.
[11] Jinjun Chen,et al. A Dynamic Key Length Based Approach for Real-Time Security Verification of Big Sensing Data Stream , 2015, WISE.
[12] Fahim Arif,et al. Fairness improvement in long chain multihop wireless ad hoc networks , 2013, 2013 International Conference on Connected Vehicles and Expo (ICCVE).
[13] Shahzad,et al. RECOMMENDER SYSTEM ON STRUCTURED DATA , 2016 .
[14] Nazia Azim,et al. Offsite 2-Way Data Replication towards Improving Data Refresh Performance , 2016 .
[15] Majid Sarrafzadeh,et al. Optimal Energy Aware Clustering in Sensor Networks , 2002 .
[16] Anantha P. Chandrakasan,et al. An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..
[17] Farman Ullah,et al. Survey: Dealing Non-Functional Requirements at Architecture Level , 2016 .
[18] Syed Roohullah Jan,et al. Issues In Global Software Development (Communication, Coordination and Trust) - A Critical Review , 2016 .
[19] Jinjun Chen,et al. DPBSV -- An Efficient and Secure Scheme for Big Sensing Data Stream , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[20] Farman Ullah,et al. A Survey: Embedded Systems Supporting By Different Operating Systems , 2016, ArXiv.
[21] Abdelkrim Haqiq,et al. Secure Communication and Routing Architecture in Wireless Sensor Networks , 2014 .
[22] Xiangjian He,et al. Enhancing Lifetime and Quality of Data in Cluster-Based Hierarchical Routing Protocol for Wireless Sensor Network , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.
[23] Muhammad Babar,et al. Applications and Challenges Faced by Internet of Things - A Survey , 2016 .
[24] Sher Afzal Khan,et al. Delay and throughput performance improvement in wireless sensor and actor networks , 2015, 2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW).
[25] Xiangjian He,et al. PASCCC: Priority-based application-specific congestion control clustering protocol , 2014, Comput. Networks.
[26] Fazlullah Khan,et al. An Innovative Approach to Investigate Various Software Testing Techniques and Strategies , 2016 .
[27] Xiangjian He,et al. A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.
[28] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[29] Xiangjian He,et al. A Sybil attack detection scheme for a forest wildfire monitoring application , 2018, Future Gener. Comput. Syst..
[30] F. Khan,et al. Dual head clustering scheme in wireless sensor networks , 2012, 2012 International Conference on Emerging Technologies.
[31] Xiangjian He,et al. A Sybil Attack Detection Scheme for a Centralized Clustering-Based Hierarchical Network , 2015, TrustCom 2015.
[32] Xiangjian He,et al. Energy Evaluation Model for an Improved Centralized Clustering Hierarchical Algorithm in WSN , 2013, WWIC.
[33] Wendi B. Heinzelman,et al. Application-specific protocol architectures for wireless networks , 2000 .
[34] Jinjun Chen,et al. A dynamic prime number based efficient security mechanism for big sensing data streams , 2017, J. Comput. Syst. Sci..
[35] Deepak Puthal,et al. Effective Machine to Machine Communications in Smart Grid Networks , 2012 .
[36] Aries Kusdaryono,et al. A Clustering Protocol with Mode Selection for Wireless Sensor Network , 2011, J. Inf. Process. Syst..