Электротехника - 621.3

Научные статьи

В разделе "Электротехника"
Extending the WSN lifetime by Dividing the Network Area into a Specific Zones
Mishall H. Awaad, Wid A. Jebbar
A Scalable Wireless Sensor Network (WSN) Based Architecture for Fire Disaster Monitoring in the Developing World
Emmanuel Lule, Tonny Eddie Bulega
Helper Feedback based Medium Access Control Protocol: A Reliable Co-operative MAC Scheme for MANET
Nidhi Newalkar, Piyush Kumar Shukla, Sanjay Silakari
Performance Evaluation of Power Aware VM Consolidation using Live Migration
Gaganpreet Kaur Sehdev, Anil Kumar
Multipath Data Transmission with minimization of Congestion Using Ant Colony Optimization for MTSP and Total Queue Length
Dhriti Sundar Maity, Subhrananda Goswami
Object Authentication Using RFID Technology: A Multi-tag Approach
Subhasish Dhal, Indranil Sen Gupta
Fuzzy Based Energy Efficient Multiple Cluster Head Selection Routing Protocol for Wireless Sensor Networks
Sohel Rana, Ali Newaz Bahar, Nazrul Islam, Johirul Islam
A Comparative Performance Analysis of Routing Protocols in MANET using NS3 Simulator
Rakesh Kumar Jha, Pooja Kharga
Weighted Round Robin and Rate Limiter based Fair Queuing for WRR
Tomáš Balogh, Martin Medvecký
Load Balancing Early Handoff Scheme for Multimedia Data Transmission in Wireless Networks
Cheng-Wei Hu, Yung-Chung Wang, Jenn-Shing Wang
Fast and Efficient Design of a PCA-Based Hash Function
Alaa Eddine Belfedhal, Kamel Mohamed Faraoun
Efficient Traffic Engineering Strategies for Optimizing Network Throughput in WDM All-Optical Networks
Mohamed Koubàa, Naama Amdouni, Taoufik Aguili
ANM to Perceive and Thwart Denial of Service Attack in WLAN
Durairaj M, Persia A
Communication Architecture for Underwater Wireless Sensor Network
Seema Verma, Prachi
An Ultra-secure Router-to-router Spontaneous Key Exchange System
Pramode K. Verma, Mayssaa El Rifai
A Model for Detecting Tor Encrypted Traffic using Supervised Machine Learning
Alaeddin Almubayed, Ali Hadi, Jalal Atoum
An Efficient Method to Audio Steganography based on Modification of Least Significant Bit Technique using Random Keys
Ali M. Meligy, Mohammed M. Nasef, Fatma T. Eid
Analysis of Base Station Assisted Novel Network Design Space for Edge-based WSNs
Muni Venkateswarlu K., A. Kandasamy, Chandrasekaran K.
Genetic Centralized Dynamic Clustering in Wireless Sensor Networks
Mekkaoui Kheireddine, Rahmoun Abdellatif, Gianluigi Ferrari
Experimental Analysis of OLSR and DSDV Protocols on NS-2.35 in Mobile Ad-Hoc Networks
Shelja Sharma, Suresh Kumar Bhardwaj
Hardware Implementation of Fidelity based On Demand Routing Protocol in MANETs
Himadri N. Saha, Rohit Singh, Debika Bhattacharyya
Genetic Algorithm to Solve the Problem of Small Disjunct In the Decision Tree Based Intrusion Detection System
Chandrashekhar Azad, Vijay Kumar Jha
Addressing the Bandwidth issue in End-to-End Header Compression over IPv6 Tunneling Mechanism
Dipti Chauhan, Sanjay Sharma
SMAODV: A Novel Smart Protocol for Routing in Ad-hoc Wireless Networks Using the PageRank Algorithm
Ali Gozali, Keivan Borna
A Cluster based Key Management Scheme for Underwater Wireless Sensor Networks
Seema Verma, Prachi
A Mathematical Model on Selfishness and Malicious Behavior in Trust based Cooperative Wireless Networks
Kaushik Haldar, Nitesh Narayan, Bimal K. Mishra
Improving Quality of Service of Femto Cell Using Optimum Location Identification
Seetaiah Kilaru, Aditya Gali
A Cross Layer for Detection and Ignoring Black Hole Attack in MANET
Azza Mohammed, Boukli Hacene Sofiane, Faraoun kamel Mohamed
Role of Mobile Agents in the Layered Architecture of Mobile Ad-hoc Networks
Bindiya Bhatia, M.K.Soni, Parul Tomar
Performance Evaluation of AODV and GOD for Qos Aware Applications through Realistic Conditions in VANET
Richa Sharma, Jyoteesh Malhotra
Performance Analysis of VOIP over GRE Tunnel
Aria. Asadi Eskandar, Mahbubur. R. Syed, Bahareh. Zarei.M
The New Block Cipher Design (Tigris Cipher)
Omar A. Dawood, Abdul Monem S. Rahma, Abdul Mohsen J. Abdul Hossen
Quality Evaluation of Mobile Networks Using VoIP Applications: A Case Study with Skype and LINE based-on Stationary Tests in Bangkok
Pongpisit Wuttidittachotti, Therdpong Daengsi
Enhanced Voting based Secure Localization for Wireless Sensor Networks
M. B. Nirmala, A. S. Manjunatha
FPGA Implementation of Secure Force (64-Bit) Low Complexity Encryption Algorithm
Shujaat Khan, M. Sohail Ibrahim, Mansoor Ebrahim, Haseeb Amjad
Secure Model for SMS Exchange over GSM
Mohammed Baqer M. Kamel, Loay E. George
Dynamic and Real-time Sleep Schedule Protocols for Energy Efficiency in WSNs
Kaebeh Yaeghoobi S.B., M.K. Soni, S.S. Tyagi
Energy Conscious based Multipath Routing Algorithm in WSN
K.Rajasekaran, Kannan Balasubramanian
Real-Time Encryption/Decryption of Audio Signal
M.I.Khalil
Modified LEACH-DT Algorithm with Hierarchical Extension for Wireless Sensor Networks
Vrinda Gupta, Rajoo Pandey