Search Results - data distribution ((((sensor algorithm) OR (based algorithm))) OR (bees algorithm))
Search alternatives:
- data distribution »
- sensor algorithm »
- bees algorithm »
-
1
Improved tree routing protocol in zigbee networks
Published 2010“…ImpTR protocol uses an approach to select next hope depending on new algorithm and uses the same tree topology construction for distributing address to all sensor nodes in the network. …”
Get full text
Get full text
Thesis -
2
Scheduled activity energy-aware distributed cluster- based routing algorithm for wireless sensor networks with non-uniform node distribution
Published 2014“…The main and definitive target of routing protocols in Wireless Sensor Networks (WSN) is passing data from the sensor nodes to the sink in most energy efficient manner besides considering the accuracy of data. …”
Get full text
Get full text
Thesis -
3
-
4
A scheduled activity energy aware distributed clustering algorithm for wireless sensor networks with nonuniform node distribution
Published 2014“…Nonuniform node deployment makes the cluster-based routing protocol less efficient in wireless sensor networks (WSNs). …”
Get full text
Get full text
Get full text
Article -
5
Efficient k-coverage scheduling algorithms for wireless sensor networks / Ahmed Abdullah Saleh Al-Shalabi
Published 2014“…An efficient k-coverage algorithm for sensors with fixed sensing range (Maximum Layers Scheduling algorithm - MLS) is demonstrated. …”
Get full text
Get full text
Thesis -
6
An improved dynamic load balancing for virtualmachines in cloud computing using hybrid bat and bee colony algorithms
Published 2021“…Therefore, to overcome these problems, this study proposed an improved dynamic load balancing technique known as HBAC algorithm which dynamically allocates task by hybridizing Artificial Bee Colony (ABC) algorithm with Bat algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
A novel scheduling algorithm based on game theory and multicriteria decision making in LTE network
Published 2015“…On the first level, bankruptcy and shapely value algorithm fairly distribute the resources among smart grid applications. …”
Get full text
Get full text
Get full text
Article -
8
Multi-mobile agent itinerary planning algorithms for data gathering in wireless sensor networks: a review paper
Published 2017“…More importantly, the review showed that theses algorithms did not take into account the security of the data gathered by the mobile agent. …”
Get full text
Get full text
Get full text
Article -
9
A spawn mobile agent itinerary planning approach for energy-efficient data gathering in wireless sensor networks
Published 2017“…The MA-based approach employs two algorithms: Single-agent Itinerary Planning (SIP) and Multi-mobile agent Itinerary Planning (MIP) for energy-efficient data gathering. …”
Get full text
Get full text
Get full text
Article -
10
Machine learning in botda fibre sensor for distributed temperature measurement
Published 2023“…To make the sensor more reliable, temperature data must be collected over the length of the cable, or distributed data rather than point data. …”
text::Thesis -
11
Energy efficient geographical and power based clustering algorithm for heterogeneous wireless sensor networks
Published 2011“…Also, a large number of nodes are self-organized by a distributed cluster formation technique. Moreover, a randomized technique is used to rotate the local cluster-heads base on power label in order to evenly distribute the energy load among the sensors in the network. …”
Get full text
Get full text
Conference or Workshop Item -
12
Performance evaluation of load balancing algorithm for virtual machine in data centre in cloud computing
Published 2018“…Cloud computing has become biggest buzz in the computer era these days.It runs entire operating systems on the cloud and doeverything on cloud to store data off-site.Cloud computing is primarily based on grid computing, but it’s a new computational model.Cloud computing has emerged into a new opportunity to further enhance way of hosting data centre and provide services.The primary substance of cloud computing is to deal the computing power,storage,different sort of stages and services which assigned tothe external users on demand through the internet.Task scheduling in cloud computing is vital role optimisation and effective dynamic resource allocation for load balancing.In cloud, the issue focused is under utilisation and over utilisation of the resources to distribute workload of multiple network links for example,when cloud clients try to access and send request tothe same cloud server while the other cloud server remain idle at that moment, leads to the unbalanced of workload on cloud data centers.Thus, load balancing is to assign tasks to the individual cloud data centers of the shared system so that no single cloud data centers is overloaded or under loaded.A Hybrid approach of Honey Bee (HB) and Particle Swarm Optimisation (PSO) load balancing algorithm is combined in order to get effective response time.The proposed hybrid algorithm has been experimented by using CloudSim simulator.The result shows that the hybrid load balancing algorithm improves the cloud system performance by reducing the response time compared to the Honey Bee (HB) and Particle Swarm Optimisation (PSO) load balancing algorithm.…”
Get full text
Get full text
Get full text
Article -
13
Improving on the network lifetime of clustered-based wireless sensor network using modified leach algorithm
Published 2012“…Meanwhile in LEACH, the cluster head selection was based on distributed algorithm. Both of these protocols was implemented in network simulator to compare the performance. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Metaheuristic optimization techniques for localization in outdoor wireless sensor networks: a comprehensive review
Published 2025“…This paper provides an overview of localization algorithms, including centralized and distributed algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
TDMA scheduling analysis of energy consumption for iot wireless sensor network
Published 2019“…The base-work paper of the research presents an improvement of DRAND algorithm based on energy consumption in IoT WSN to enhance the node energy consumption and iv increase the network lifetime. …”
Get full text
Get full text
Thesis -
16
MCRP: multiple chain routing protocol for energy efficiency in homogeneous wireless sensor networks
Published 2019“…The MCRP works within two stages: the initialization stage and the data transmission stage. Simulation results demonstrate that the presented algorithm MCRP achieves its design goals and outperforms the existing work such as Chain-Chain based routing protocol (CCBRP), and Two-stage chain routing protocol (TSCP) algorithms in terms of Network lifetime, FND and LND (first node and last node died), Network stability period, and Energy consumption.…”
Get full text
Get full text
Conference or Workshop Item -
17
An energy based cluster head selection unequal clustering algorithm with dual sink (ECH-DUAL) for continuous monitoring applications in wireless sensor networks
Published 2018“…In our algorithm, tentative cluster head is selected based on energy based timer, residual energy, node IDs and trust value. …”
Get full text
Get full text
Article -
18
Accurate range free localization in multi-hop wireless sensor networks
Published 2019“…To localize wireless sensor networks (WSN)s nodes, only the hop-based data have been so far utilized by range free techniques, with poor-accuracy, though. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Efficient k-coverage scheduling algorithms for wireless sensor networks / Ahmed Abdullah Saleh Al-Shalabi
Published 2014“…An efficient k-coverage algorithm for sensors with fixed sensing range (Maximum Layers Scheduling algorithm - MLS) is demonstrated. …”
Get full text
Get full text
Book Section -
20
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis
