ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Technology
Computing
Architecture and Urbanism
Pure sciences
Computing
Education
Social Sciences
Literature
Biology
Research
all records (75)

Languages
English
Spanish
Portuguese
German
French

Countries
Indonesia
USA
Brazil
South Africa
Austria
Denmark
Ukraine
Canada
India
Spain
all records (81)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
13.811  Articles
1 of 1.382 pages  |  10  records  |  more records»
Soft computing is a collection of different computing methodologies that include neuro computing, fuzzy logic, evolutionary computing, and probabilistic reasoning. These are aimed to exploit the tolerance for imprecision and uncertainty to achieve tractab... see more

In order to reduce the energy consumption and enhance the robustness of wireless sensor network (WSN), this paper proposes a hierarchical clustering routing algorithm based on fuzzy mathematics (HCRAFM). To make a comprehensive analysis of WSN, it is also... see more

For wireless sensor networks, data aggregation scheme that reduces a large amount of transmission is the most practical technique. In previous studies, Homomorphic encryptions have been applied to conceal communication during aggregation such that enciphe... see more

Wireless Sensor Networks are popular solutions for various applications in order to reduce the efforts required by traditional cable-based systems. If the system in question is used to monitor and control physical processes, robust and reliable communicat... see more

To improve the performance of navigation systems and expand their application, a navigation ground augmentation system platform was designed based on wireless sensor. The system included the signal augmentation generation and reception verification platfo... see more

The wireless sensor network (WSN) is an attractive technology, which combines embedded systems and communication networks making them more efficient and effective. Currently, WSNs have been developed for various monitoring applications. In this research, ... see more

A data collection via secure routing in wireless sensor networks (WSNs) has given attention to one of security issues. WSNs pose unique security challenges due to their inherent limitations in communication and computing, which makes vulnerable to various... see more

Biometric based human authentication system is used for security purpose in many organizations in the present world. This biometric authentication system has several vulnerable points. Two of vulnerable points are protection of biometric templates at syst... see more

Recent advances in the characterization of fundamental limits on interference management in wireless networks and the discovery of new communication schemes on how to handle interference led to a better understanding towards the capacity of such networks.... see more

1 of 1.382 pages  |  10  records  |  more records»