Results 81 to 90 of about 36,947 (246)

Fuzzy‐Based Optimized Cluster Head Selection With Energy Prediction for Unequal Clustering in Wireless Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, Volume 2026, Issue 1, 2026.
The sensor network consists of several low‐powered electronic sensing devices that are strategically deployed in a predefined area to gather important information. The sensors have low computing capacity, constrained battery energy, and limited storage. Therefore, the sensed data should be communicated to the sink efficiently for further processing. In
Shivendra Kumar Pandey   +3 more
wiley   +1 more source

EE‐FGO: Energy‐Efficient Fuzzy Grey Wolf Optimization for Cluster Head Selection in WSN

open access: yesJournal of Electrical and Computer Engineering, Volume 2026, Issue 1, 2026.
A crucial component of the Internet of Things (IoT) is the wireless sensor network (WSN), which comprises numerous sensor nodes detecting various atmospheric variations such as temperature, pressure and humidity. These sensor nodes rely on internal batteries to power their sensors and communicate data with other nodes within the network.
Vipul Narayan   +6 more
wiley   +1 more source

Constructing Maximum-Lifetime Data-Gathering Tree in WSNs Based on Compressed Sensing

open access: yesInternational Journal of Distributed Sensor Networks, 2016
Data gathering is one of the most important operations in many wireless sensor networks (WSNs) applications. In order to implement data gathering, a tree structure rooted at the sink is usually defined. In most wireless sensor networks, nodes are powered
Zhengyu Chen   +3 more
doaj   +1 more source

Semi-Supervised Clustering-Based DANA Algorithm for Data Gathering and Disease Detection in Healthcare Wireless Sensor Networks (WSN) [PDF]

open access: gold, 2023
Anurag Sinha   +8 more
openalex   +1 more source

Enhanced IoT Security: Blockchain, Cryptography, and CNN Integration for Mask Detection

open access: yesJournal of Electrical and Computer Engineering, Volume 2026, Issue 1, 2026.
Security concerns have become paramount, especially with the increasing reliance on facial recognition technology for identity verification. The use of masks, while essential for health protection, poses a significant challenge for these systems, hindering accurate identification.
Imen Hagui   +3 more
wiley   +1 more source

A Novel Hybrid Search and Remove Strategy for Power Balance Wireless Charger Deployment in Wireless Rechargeable Sensor Networks

open access: yesEnergies, 2020
Conventional sensor nodes are often battery-powered, and battery power limits the overall lifetime of the wireless sensor networks (WSNs). Wireless charging technology can be implemented in WSNs to supply power to sensor nodes and resolve the problem of ...
Tu-Liang Lin   +2 more
doaj   +1 more source

A Communication Monitor for Wireless Sensor Networks Based on Software Defined Radio [PDF]

open access: yes, 2011
Link quality estimation of reliability-crucial wireless sensor networks (WSNs) is often limited by the observability and testability of single-chip radio transceivers.
He, Zhitao, Qin, Yian
core  

Enhancement in Performance Metrics for Mobile Ad Hoc Networks (MANETs) Using Hybrid Ant Lion Optimization (HALO) Algorithm

open access: yesJournal of Electrical and Computer Engineering, Volume 2026, Issue 1, 2026.
Mobile ad hoc networks (MANETs) are constantly confronted with issues including variable quality of service (QoS) metrics, route optimization, and flexible topology. Here, a novel hybrid ant lion optimization (HALO) algorithm is proposed that integrates the cooperative foraging behavior of ant colonies from ant colony optimization and the hunting ...
Aparna P. More   +3 more
wiley   +1 more source

Reliable routing scheme for indoor sensor networks [PDF]

open access: yes, 2010
Indoor Wireless sensor networks require a highly dynamic, adaptive routing scheme to deal with the high rate of topology changes due to fading of indoor wireless channels.
Cole, P.   +3 more
core   +1 more source

A Secure and Robust Blockchain‐Based Medical Image Encryption Approach Using Lorenz Chaotic System

open access: yesJournal of Sensors, Volume 2026, Issue 1, 2026.
Keeping medical images confidential while transmitting is crucial, especially in an open networking environment. One effective approach is blockchain‐based encryption, which provides strong security for sensitive healthcare data. To ensure the greatest levels of medical data integrity and authenticity, our proposed scheme employs a unique Lorenz ...
Fahima Hajjej   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy