Showing 101 - 120 results of 3,167 for search 'WJSN~', query time: 2.78s Refine Results
  1. 101
  2. 102

    Research on a hexagonal lattice optimal clustering routing algorithm based on hybrid CS for WSN by Can CUI, Yi SUN, Jun LU, Jian-hong HAO

    Published 2016-05-01
    “…A hexagon lattice clustering model for WSN was proposed based on hybrid CS.The relationship between data transmission times and compression ratio and clus er size was analyzed quantitatively to get optimal clustering number.Then,a hexagon lattice optimal clustering routing algorithm for WSN based on ybrid CS was proposed,to balance network communication overhead and reduce data transmission times.Simulation experiment proved that the optimal clustering model and algorithm proposed are better than traditional ones in reducing data transmis-sion times in WSN.…”
    Get full text
    Article
  3. 103

    Optimal approach of suppressing WSN malware propagation based on cloud computing and dynamic Bayesian game by Shigen SHEN, Sheng FENG, Haiping ZHOU, Longjun HUANG, Keli HU, Qiying CAO

    Published 2018-09-01
    “…To apply intrusion detection system (IDS) efficiently so as to suppress WSN malware propagation,a cloud-based network infrastructure for realizing functions of WSN IDS was presented,considering the real basis that the resources of WSN nodes were limited whilst the resources of cloud computing platform were almost unlimited.Based on the analysis of the game process between a sensor node and the corresponding WSN IDS agent,a WSN-malware-propagation-suppression game model was constructed by employing the dynamic Bayesian game,and the requirements of energy consumption in sending monitored data and privacy protection for sensor nodes were satisfied.According to the proposed game type and refined Bayesian equilibrium,the optimal strategie for suppressing WSN malware was proposed as well the algorithm for actual application was given.The factors that influence WSN IDS agents to select their optimal strategies were analyzed,and the experimental foundation was provided for the application of the proposed approach.…”
    Get full text
    Article
  4. 104

    Chasing the Beginning of Reionization in the JWST Era by Christopher Cain, Garett Lopez, Anson D’Aloisio, Julian B. Muñoz, Rolf A. Jansen, Rogier A. Windhorst, Nakul Gangolli

    Published 2025-01-01
    “…Recent JWST observations at z  > 6 may imply galactic ionizing photon production above prior expectations. …”
    Get full text
    Article
  5. 105
  6. 106
  7. 107
  8. 108

    Segment routing for WSN using hybrid optimization with energy-efficient game theory-based clustering technique by S. Sangeetha, T. Aruldoss Albert Victoire, M. Premkumar, R. Sowmya

    Published 2025-01-01
    “…This research focuses on Wireless Sensor Networks (WSNs) and proposes a three-phase approach to achieve energy-efficient routing. …”
    Get full text
    Article
  9. 109
  10. 110
  11. 111
  12. 112
  13. 113
  14. 114

    TDOA-based WSN localization with hybrid covariance matrix adaptive evolutionary strategy and gradient descent distance techniques by V.G. Saranya, S. Karthik

    Published 2025-01-01
    “…Wireless Sensor Networks (WSNs) play a vital role in modern intelligent systems, with localization techniques critical for determining the precise positions of sensor nodes. …”
    Get full text
    Article
  15. 115

    Suppression model of energy sink-hole attack in WSN based on the unequal cluster radius and mobile cluster head by Wei-wei ZHOU, Bin YU

    Published 2017-11-01
    “…To overcome the problem that partial cluster heads were drastically exhausted by the energy sink-hole attack in wireless sensor network,a novel suppression model based on the optimal path of mobile cluster heads was proposed,which was shown to balance the energy consumption in each cluster head.With the adoption of unequal cluster radius and data traffic monitoring explicitly,the inhibition mechanism was modeled as multivariate linear equations.Furthermore,toroidal projection was adopted to calculate the Euclidean distance,based on which the initial energy of mobile cluster head was configured correspondingly.On this basis,an algorithm based on the minimum cluster lifetime and throughput threshold was provided to achieve the detection and suppression of energy sink-hole attack.The experimental results show that the developed algorithm can suppress energy sink-hole attack evidently and efficiently and is suitable to the resource constrained WSN.…”
    Get full text
    Article
  16. 116
  17. 117
  18. 118
  19. 119
  20. 120

    Transition to the sustainable supply chains: (on the example of PJSC Uralkali) by Strimovskaya Anna, Ryumkina Kseniya, Presnyakova Olga

    Published 2024-12-01
    “…The article proposes a systematization of the tasks of managing the supply and sale of products of the industrial enterprise PJSC Uralkali that produces potash fertilizers according to various management levels. …”
    Get full text
    Article