|
|
|
Islam T. Almalkawi,Jafar Raed,Ayoub Alsarhan,Alaa Abdallah,Emad Abdallah
Pág. pp. 43 - 69
Even though many security schemes proposed for wireless sensor networks protect transmitted data content from being revealed to different types of attacks and fulfill most of the desired security requirements, they are not addressing concealing the priva...
ver más
|
|
|
|
|
|
Armin Lawi, Benny L. E. Panggabean and Takaichi Yoshida
Currently, most middleware application developers have two choices when designing or implementing Application Programming Interface (API) services; i.e., they can either stick with Representational State Transfer (REST) or explore the emerging GraphQL te...
ver más
|
|
|
|
|
|
Liangrui Tang, Zhilin Lu and Bing Fan
In energy-constrained wireless sensor networks, low energy utilization and unbalanced energy distribution are seriously affecting the operation of the network. Therefore, efficient and reasonable routing algorithms are needed to achieve higher Quality of...
ver más
|
|
|
|
|
|
Daniela Alexandra Embus, Andres Julián Castillo, Fulvio Yesid Vivas, Oscar Mauricio Caicedo and Armando Ordóñez
Network selection plays a pivotal role in ensuring efficient handover management. Some existing approaches for network selection may use one criterion, such as RSSI (Received Signal Strength Indicator) or SINR (Signal to Interference Noise Ratio). Howeve...
ver más
|
|
|
|
|
|
Christos Nakas, Dionisis Kandris and Georgios Visvardis
Wireless Sensor Networks (WSNs) are among the most emerging technologies, thanks to their great capabilities and their ever growing range of applications. However, the lifetime of WSNs is extremely restricted due to the delimited energy capacity of their...
ver más
|
|
|