Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Distributed database management techniques for wireless sensor networks
In sensor networks, the large amount of data generated by sensors greatly influences the
lifetime of the network. To manage this amount of sensed data in an energy-efficient way …
lifetime of the network. To manage this amount of sensed data in an energy-efficient way …
A survey of security issues in wireless sensor networks
Y Wang, G Attebury, B Ramamurthy - 2006 - digitalcommons.unl.edu
Abstract Wireless Sensor Networks (WSNs) are used in many applications in military,
ecological, and health-related areas. These applications often include the monitoring of …
ecological, and health-related areas. These applications often include the monitoring of …
A survey on wireless sensor network security
J Sen - arxiv preprint arxiv:1011.1529, 2010 - arxiv.org
Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research
community due their wide range of applications. Due to distributed nature of these networks …
community due their wide range of applications. Due to distributed nature of these networks …
Security in wireless sensor networks
Recent advances in electronics and wireless communication technologies have enabled the
development of large-scale wireless sensor networks that consist of many low-power, low …
development of large-scale wireless sensor networks that consist of many low-power, low …
[SÁCH][B] Industrial communication technology handbook
R Zurawski - 2014 - books.google.com
Featuring contributions from major technology vendors, industry consortia, and government
and private research establishments, the Industrial Communication Technology Handbook …
and private research establishments, the Industrial Communication Technology Handbook …
[SÁCH][B] The state of the art in intrusion prevention and detection
ASK Pathan - 2014 - api.taylorfrancis.com
Most of the security threats in various communications networks are posed by the illegitimate
entities that enter or intrude within the network perimeter, which could commonly be termed …
entities that enter or intrude within the network perimeter, which could commonly be termed …
Energy-efficient secure pattern based data aggregation for wireless sensor networks
Data aggregation in wireless sensor networks eliminates redundancy to improve bandwidth
utilization and energy-efficiency of sensor nodes. This paper presents a secure energy …
utilization and energy-efficiency of sensor nodes. This paper presents a secure energy …
Charting collective knowledge: supporting self‐regulated learning in the workplace
Purpose–This study aims to outline an approach to improving the effectiveness of work‐
based learning through knowledge creation and enhancing self‐regulated learning. The …
based learning through knowledge creation and enhancing self‐regulated learning. The …
The impact of data aggregation on the performance of wireless sensor networks
With the increasing need for different energy saving mechanisms in Wireless Sensor
Networks (WSNs), data aggregation techniques for reducing the number of data …
Networks (WSNs), data aggregation techniques for reducing the number of data …
[SÁCH][B] Embedded Systems Handbook 2-Volume Set
R Zurawski - 2018 - taylorfrancis.com
During the past few years there has been an dramatic upsurge in research and
development, implementations of new technologies, and deployments of actual solutions …
development, implementations of new technologies, and deployments of actual solutions …