Search Results - data distribution ((((control algorithm) OR (computer algorithm))) OR (sensor algorithm))
Search alternatives:
-
1
Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems
Published 2014“…To implement the parallel algorithms a distributed parallel computing laboratory using easily available low cost computers is setup. …”
Get full text
Get full text
Thesis -
2
Optimizing wireless sensor networks: A survey of clustering strategies and algorithms
Published 2024“…Clustering has become a vital technique in the control of energy demands with the various sensor nodes being grouped in several clusters under the supervision of a cluster head. …”
Get full text
Get full text
Get full text
Article -
3
Adaptive Algorithm for Optimal Route Configuration in Multi-Hop Wireless Sensor Network
Published 2017“…This paper proposes an optimal route configuration technique based on an adaptive genetic algorithm in which the architecture of multi-hop wireless sensor network is considered as a distributed computing infrastructure. …”
Get full text
Get full text
Get full text
Article -
4
-
5
Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network
Published 2019“…A Wireless Sensor Network (WSN) consists of spatially distributed autonomous sensors which produces a measurable response to a change in a physical or chemical condition, e.g. temperature and ground composition. …”
Get full text
Get full text
Thesis -
6
A Divide-and-Distribute Approach to Single-Cycle Learning HGN Network for Pattern Recognition
Published 2010“…Distributed Hierarchical Graph Neuron (DHGN) is a single-cycle learning distributed pattern recognition algorithm, which reduces the computational complexity of existing pattern recognition algorithms by distributing the recognition process into smaller clusters. …”
Get full text
Get full text
Conference or Workshop Item -
7
Resourceful residual energy consumption in TDMA scheduling for IoT-based wireless sensor network
Published 2019“…This paper discusses the optimization of energy-topology (E-T) factors for distributed time division multiplexing algorithm (TDMA) slot scheduling for high-speed data link capacity. …”
Get full text
Get full text
Get full text
Article -
8
The comparison study among optimization techniques in optimizing a distribution system state estimation
Published 2017“…The state estimator actually depends on many factors, such as data sensitive regarding the sensors accuracy, the availability of raw data, the network database accuracy, and the time skew of data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model
Published 2019“…Furthermore, the attacks are detected and prevented by utilizing secure node authentication, data fragmentation algorithms, fully homomorphic encryption, and access control model. …”
Get full text
Get full text
Article -
10
Efficient k-coverage scheduling algorithms for wireless sensor networks / Ahmed Abdullah Saleh Al-Shalabi
Published 2014“…Furthermore, MLS efficiently reduces the computation complexity and distributes the energy expenditure among sensors in the network. …”
Get full text
Get full text
Thesis -
11
Traffic aware wireless sensor networks MAC protocol for smart grid applications using spiral backoff mechanism
Published 2014“…Simulation results show that proposed spiral backoff algorithm reduces the end-to-end delay and increase packet delivery ratio (PDR) for real time data.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Energy balancing mechanisms for decentralized routing protocols in wireless sensor networks
Published 2012“…This thesis presents three decentralized algorithms that are robust,scalable, and can be successfully executed in sensor networks. …”
Get full text
Get full text
Thesis -
13
An Improved Distributed Scheduling Algorithm for Wireless Sensor Networks
Published 2012“…In contrast to earlier traditional scheduling algorithms of medium access control (MAC), which are generally designed for sequential slot assignments, this paper presents an improved algorithm for distributed scheduling. …”
Get full text
Get full text
Conference or Workshop Item -
14
RED, GRED, AGRED congestion control algorithms in heterogeneous traffic types
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
15
High-throughput and energy-efficient Contiki MAC layer scheme in IEEE 802.15.4 for structural health monitoring
Published 2021“…Some of these challenges result from the transmission of huge amounts of data in each data sensing period and the complexity of SHM algorithms. …”
Get full text
Get full text
Thesis -
16
TDMA scheduling analysis of energy consumption for iot wireless sensor network
Published 2019“…Wireless Sensor Network (WSN) is one of the most explored topics of research in the field of computer science for many years and recently it gets more concern because of Big Data, IoT and 5G robustness. …”
Get full text
Get full text
Thesis -
17
A dynamic replication aware load balanced scheduling for data grids in distributed environments of internet of things
Published 2018“…Grid computing is a powerful distributed and scalable computing infrastructure that deals with massive data-intensive applications. …”
Get full text
Get full text
Article -
18
A spawn mobile agent itinerary planning approach for energy-efficient data gathering in wireless sensor networks
Published 2017“…Mobile agent (MA), a part of the mobile computing paradigm, was recently proposed for data gathering in Wireless Sensor Networks (WSNs). …”
Get full text
Get full text
Get full text
Article -
19
Metaheuristic optimization techniques for localization in outdoor wireless sensor networks: a comprehensive review
Published 2025“…This paper provides an overview of localization algorithms, including centralized and distributed algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis
