Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A comprehensive study of IoT and WSN MAC protocols: Research issues, challenges and opportunities
Recent advances in wireless technologies, micro-electro-mechanical systems, and
embedded systems enable the popular usage of the Internet of Things (IoT) and wireless …
embedded systems enable the popular usage of the Internet of Things (IoT) and wireless …
WSN protocols and security challenges for environmental monitoring applications: A survey
KS Adu-Manu, F Engmann… - Journal of …, 2022 - Wiley Online Library
In recent years, communication technology has improved exponentially, partly owing to the
locations and nature of the deployment of sensor nodes. Wireless sensor networks (WSNs) …
locations and nature of the deployment of sensor nodes. Wireless sensor networks (WSNs) …
Energy optimized micro genetic algorithm based LEACH protocol for WSN
M Radhika, P Sivakumar - Wireless Networks, 2021 - Springer
This article presents the design, analyses and implementation of the novel routing protocol
for energy optimization based on LEACH for WSN. Network Lifetime is the major problem in …
for energy optimization based on LEACH for WSN. Network Lifetime is the major problem in …
An IoT based air pollution monitoring system for smart cities
H Gupta, D Bhardwaj, H Agrawal… - 2019 IEEE …, 2019 - ieeexplore.ieee.org
As the world's population is becoming increasingly urban, the cities are under pressure to
remain livable. In recent years, the air quality of the cities has become one of the major …
remain livable. In recent years, the air quality of the cities has become one of the major …
[HTML][HTML] A heuristic angular clustering framework for secured statistical data aggregation in sensor networks
L Krishnasamy, RK Dhanaraj, D Ganesh Gopal… - Sensors, 2020 - mdpi.com
Clustering in wireless sensor networks plays a vital role in solving energy and scalability
issues. Although multiple deployment structures and cluster shapes have been …
issues. Although multiple deployment structures and cluster shapes have been …
RLBEEP: Reinforcement-learning-based energy efficient control and routing protocol for wireless sensor networks
One of the most important topics in the field of wireless sensor networks is the development
of approaches to improve network lifetime. In this paper, an energy-efficient control and …
of approaches to improve network lifetime. In this paper, an energy-efficient control and …
Managing crowds with wireless and mobile technologies
M Yamin, AM Basahel… - … and Mobile Computing, 2018 - Wiley Online Library
Thousands of people have lost their lives in stampedes and other crowd related disasters in
recent years. Most of these fatalities seem to have been caused by poor control and …
recent years. Most of these fatalities seem to have been caused by poor control and …
Dynamic directional routing for mobile wireless sensor networks
R Almesaeed, A Jedidi - Ad Hoc Networks, 2021 - Elsevier
Abstract The interest in Mobile Wireless Sensor Networks (MWSN) has grown considerably
due to its various applications in the fields of military, industrial infrastructure, automation …
due to its various applications in the fields of military, industrial infrastructure, automation …
Scalable and sustainable wireless sensor networks for agricultural application of Internet of things using fuzzy c-means algorithm
A Rajput, VB Kumaravelu - Sustainable Computing: Informatics and …, 2019 - Elsevier
The integration of sensing, communication and Internet is innovatively merging into a new
technology called Internet of things (IoT). Wireless sensor networks (WSNs) are the main …
technology called Internet of things (IoT). Wireless sensor networks (WSNs) are the main …
TASRP: a trust aware secure routing protocol for wireless sensor networks
Trust-based security models are efficient and reliable over traditional cryptographic schemes
(eg, encryption, key management schemes) to detect and alleviate various internal threats …
(eg, encryption, key management schemes) to detect and alleviate various internal threats …