首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7篇
  免费   0篇
机械仪表   1篇
无线电   5篇
一般工业技术   1篇
  2021年   1篇
  2018年   2篇
  2017年   2篇
  2014年   1篇
  1979年   1篇
排序方式: 共有7条查询结果,搜索用时 0 毫秒
1
1.
Wireless Personal Communications - Efficiency can be achieved in CEAACK MANETs by implementing clustering technique into the network. Using this strategy the cluster head can monitor the members...  相似文献   
2.
The wireless body sensor network (WBSN) an extensive of WSN is in charge for the detection of patient’s health concerned data. This monitored health data are essential to be routed to the sink (base station) in an effective way by approaching the routing technique. Routing of tremendous sensed data to the base station minimizes the life time of the network due to heavy traffic occurrence. The major concern of this work is to increase the lifespan of the network which is considered as a serious problem in the wireless network functionalities. In order to recover this issue, we propose an optimal trust aware cluster based routing technique in WBSN. The human body enforced for the detection of health status is assembled with sensor nodes. In this paper, three novel schemes namely, improved evolutionary particle swarm optimization (IEPSO), fuzzy based trust inference model, and self-adaptive greedy buffer allocation and scheduling algorithm (SGBAS) are proposed for the secured transmission of data. The sensor nodes are gathered to form a cluster and from the cluster, it is necessary to select the cluster head (CH) for the effective transmission of data to nearby nodes without accumulation. The CH is chosen by considering IEPSO algorithm. For securable routing, we exhibit fuzzy based trust inference model to select the trusted path. Finally, to reduce traffic occurrence in the network, we introduce SGBAS algorithm. Experimental results demonstrate that our proposed method attains better results when compared with conventional clustering protocols and in terms of some distinctive QoS determinant parameters.  相似文献   
3.
Advances in lattice-based cryptography are enabling the use of public key algorithms (PKAs) in power-constrained ad hoc and sensor network devices. Unfortunately, while many wireless networks are dominated by group communications, PKAs are inherently unicast—i.e., public/private key pairs are generated by data destinations. To fully realize public key cryptography in these networks, lightweight PKAs should be augmented with energy efficient mechanisms for group key agreement. Recently, many key management schemes for the WSNs have been proposed, but the computation and communication costs of these protocols are too high to suitable for WSNs. This paper proposes a key establish protocol for the WSNs based on combined key. The protocol adopts seed key mapping technology to achieve two-party and multi-party key establish in the WSNs, it can generate a large number of combination keys with little resources. So it effectively solve the contradiction between the sensor nodes need large storage space to store shared key with their neighbors and their limited storage space. It can also achieve mutual authentication between nodes when they establish shared key. Analysis shows that the proposed protocol has the advantages in storage efficiency, computation consumption and Communication consumption and suitable for wireless networks.  相似文献   
4.
Understanding of the mechanism of grinding is hampered by the difficulty of defining the effective cutting geometry This paper describes a simple technique for the analysis of grinding wheel profiles. This study includes the random process analysis of the section and effective profiles of the wheel  相似文献   
5.
Studying the effects of the physicochemical properties of nanomaterials on cellular uptake, toxicity, and exocytosis can provide the foundation for designing safer and more effective nanoparticles for clinical applications. However, an understanding of the effects of these properties on subcellular transport, accumulation, and distribution remains limited. The present study investigates the effects of surface density and particle size of semiconductor quantum dots on cellular uptake as well as nuclear transport kinetics, retention, and accumulation. The current work illustrates that cellular uptake and nuclear accumulation of nanoparticles depend on surface density of the nuclear localization signal (NLS) peptides with nuclear transport reaching a plateau at 20% surface NLS density in as little as 30 min. These intracellular nanoparticles have no effects on cell viability up to 72 h post treatment. These findings will set a foundation for engineering more sophisticated nanoparticle systems for imaging and manipulating genetic targets in the nucleus.  相似文献   
6.
Wireless Personal Communications - Vehicular adhoc networks are slowly gaining importance as the demand for faster communication increases. The vehicular nodes need to communicate securely via an...  相似文献   
7.
MANET is a set of mobile nodes which works in a dynamic changing network and it is capable of communicating with each other efficiently where all the nodes perform a dual role as that of a transmitter and a receiver. MANETs do not use any centralized administration for communication. The performance of a MANET can be further enhanced by adapting a cluster mechanism with the help of CEAACK to provide security from penetrators. In this paper we propose a new improved ant colony optimization algorithm with two strategies to reduce the overhead in communication by predicting mobility of node and cluster formation. Firstly, a dynamic mechanism is designed for determining one or more heuristic parameters for improving the performance of the MANET. Secondly a dynamic list of nodes are maintained which helps in forming clusters and electing the cluster head faster. In addition a dynamic broadcast approach algorithm is incorporated to provide the information about the status of the nodes to the hybrid fuzzy-ant colony algorithm. This approach ensures low maintenance cost and is expected to be robust against node failures and network topology changes. The positive outcome of these two techniques consumes low energy and in the process provides better efficiency in data transmission in MANETs. It also achieves correct delivery of packets without unnecessary delay.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号